Information Security and Privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings /

Saved in:
Bibliographic Details
Author / Creator:Wang, Huaxiong.
Imprint:Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 3108
Subject:
Format: E-Resource
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/7354382
Hidden Bibliographic Details
Other authors / contributors:Pieprzyk, Josef.
Varadharajan, Vijay.
SpringerLink (Online service)
ISBN:9783540223795
Table of Contents:
  • Broadcast Encryption and Traitor Tracing
  • Multi-service Oriented Broadcast Encryption
  • Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
  • Linear Code Implies Public-Key Traitor Tracing With Revocation
  • TTS Without Revocation Capability Secure Against CCA2
  • Private Information Retrieval and Oblivious Transfer
  • Single Database Private Information Retrieval With Logarithmic Communication
  • Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
  • Trust and Secret Sharing
  • Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
  • NGSCB: A Trusted Open System
  • Cryptanalysis (I)
  • The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
  • Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
  • The Related-Key Rectangle Attack - Application to SHACAL-1
  • Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
  • The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
  • Cryptanalysis (II)
  • Analysis of a Conference Scheme Under Active and Passive Attacks
  • Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
  • Analysis and Improvement of Micali's Fair Contract Signing Protocol
  • Digital Signatures (I)
  • Digital Signature Schemes With Domain Parameters
  • Generic Construction of Certificateless Signature
  • Cryptosystems (I)
  • A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
  • How to Re-use Round Function in Super-Pseudorandom Permutation
  • How to Remove MAC from DHIES
  • Symmetric Key Authentication Services Revisited
  • Fast Computation
  • Improvements to the Point Halving Algorithm
  • Theoretical Analysis of XL over Small Fields
  • A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
  • Mobile Agents Security
  • A Mobile Agent System Providing Offer Privacy
  • Digital Signatures (II)
  • Identity-Based Strong Designated Verifier Signature Schemes
  • Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
  • A Group Signature Scheme With Efficient Membership Revocation for Reasonable Groups
  • Convertible Nominative Signatures
  • Protocols
  • Protocols With Security Proofs for Mobile Applications
  • Secure Bilinear Diffie-Hellman Bits
  • Weak Property of Malleability in NTRUSign
  • Security Management
  • Information Security Risk Assessment, Aggregation, and Mitigation
  • Access Control and Authorisation
  • A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
  • Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
  • Cryptosystems (II)
  • Unconditionally Secure Encryption Under Strong Attacks
  • ManTiCore: Encryption With Joint Cipher-State Authentication
  • Cryptanalysis (III)
  • On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
  • On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
  • Fault Attacks on Signature Schemes
  • Author Index