Information Security and Privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings /
Saved in:
Author / Creator: | Wang, Huaxiong. |
---|---|
Imprint: | Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 3108 |
Subject: | |
Format: | E-Resource |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/7354382 |
Table of Contents:
- Broadcast Encryption and Traitor Tracing
- Multi-service Oriented Broadcast Encryption
- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
- Linear Code Implies Public-Key Traitor Tracing With Revocation
- TTS Without Revocation Capability Secure Against CCA2
- Private Information Retrieval and Oblivious Transfer
- Single Database Private Information Retrieval With Logarithmic Communication
- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
- Trust and Secret Sharing
- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
- NGSCB: A Trusted Open System
- Cryptanalysis (I)
- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
- The Related-Key Rectangle Attack - Application to SHACAL-1
- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
- Cryptanalysis (II)
- Analysis of a Conference Scheme Under Active and Passive Attacks
- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
- Analysis and Improvement of Micali's Fair Contract Signing Protocol
- Digital Signatures (I)
- Digital Signature Schemes With Domain Parameters
- Generic Construction of Certificateless Signature
- Cryptosystems (I)
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
- How to Re-use Round Function in Super-Pseudorandom Permutation
- How to Remove MAC from DHIES
- Symmetric Key Authentication Services Revisited
- Fast Computation
- Improvements to the Point Halving Algorithm
- Theoretical Analysis of XL over Small Fields
- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
- Mobile Agents Security
- A Mobile Agent System Providing Offer Privacy
- Digital Signatures (II)
- Identity-Based Strong Designated Verifier Signature Schemes
- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
- A Group Signature Scheme With Efficient Membership Revocation for Reasonable Groups
- Convertible Nominative Signatures
- Protocols
- Protocols With Security Proofs for Mobile Applications
- Secure Bilinear Diffie-Hellman Bits
- Weak Property of Malleability in NTRUSign
- Security Management
- Information Security Risk Assessment, Aggregation, and Mitigation
- Access Control and Authorisation
- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
- Cryptosystems (II)
- Unconditionally Secure Encryption Under Strong Attacks
- ManTiCore: Encryption With Joint Cipher-State Authentication
- Cryptanalysis (III)
- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
- Fault Attacks on Signature Schemes
- Author Index