Ebook: Information Security and Privacy: 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings
- Tags: Data Encryption, Management of Computing and Information Systems, Computer Communication Networks, Algorithm Analysis and Problem Complexity, Computers and Society, Coding and Information Theory
- Series: Lecture Notes in Computer Science 2119
- Year: 2001
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001.
The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001.
The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
Content:
Front Matter....Pages I-XI
A Few Thoughts on E-Commerce....Pages 1-2
New CBC-MAC Forgery Attacks....Pages 3-14
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000....Pages 15-20
Improved Cryptanalysis of the Self-Shrinking Generator....Pages 21-35
Attacks Based on Small Factors in Various Group Structures....Pages 36-50
On Classifying Conference Key Distribution Protocols....Pages 51-59
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI....Pages 60-73
New Public-Key Cryptosystem Using Divisor Class Groups....Pages 74-83
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields....Pages 84-103
Practical Key Recovery Schemes....Pages 104-114
Non-deterministic Processors....Pages 115-129
Personal Secure Booting....Pages 130-144
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules....Pages 145-158
A Strategy for MLS Workflow....Pages 159-175
Condition-Driven Integration of Security Services....Pages 176-176
SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes....Pages 177-189
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues....Pages 190-205
Private Information Retrieval Based on the Subgroup Membership Problem....Pages 206-220
A Practical English Auction with One-Time Registration....Pages 221-234
A User Authentication Scheme with Identity and Location Privacy....Pages 235-246
An End-to-End Authentication Protocol in Wireless Application Protocol....Pages 247-259
Error Detection and Authentication in Quantum Key Distribution....Pages 260-273
An Axiomatic Basis for Reasoning about Trust in PKIs....Pages 274-291
A Knowledge-Based Approach to Internet Authorizations....Pages 292-304
Applications of Trusted Review to Information Security....Pages 305-319
Network Security Modeling and Cyber Attack Simulation Methodology....Pages 320-333
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks....Pages 334-343
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS....Pages 344-359
Improving the Availability of Time-Stamping Services....Pages 360-375
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group....Pages 376-391
Democratic Systems....Pages 392-402
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme....Pages 403-416
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates....Pages 417-434
How to Construct Fail-Stop Confirmer Signature Schemes....Pages 435-444
Signature Schemes Based on 3rd Order Shift Registers....Pages 445-459
Anonymous Statistical Survey of Attributes....Pages 460-473
Secure Mobile Agent Using Strong Non-designated Proxy Signature....Pages 474-486
Elliptic Curve Based Password Authenticated Key Exchange Protocols....Pages 487-501
Elliptic Curve Cryptography on a Palm OS Device....Pages 502-513
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field....Pages 514-520
Back Matter....Pages 521-522
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001.
The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
Content:
Front Matter....Pages I-XI
A Few Thoughts on E-Commerce....Pages 1-2
New CBC-MAC Forgery Attacks....Pages 3-14
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000....Pages 15-20
Improved Cryptanalysis of the Self-Shrinking Generator....Pages 21-35
Attacks Based on Small Factors in Various Group Structures....Pages 36-50
On Classifying Conference Key Distribution Protocols....Pages 51-59
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI....Pages 60-73
New Public-Key Cryptosystem Using Divisor Class Groups....Pages 74-83
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields....Pages 84-103
Practical Key Recovery Schemes....Pages 104-114
Non-deterministic Processors....Pages 115-129
Personal Secure Booting....Pages 130-144
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules....Pages 145-158
A Strategy for MLS Workflow....Pages 159-175
Condition-Driven Integration of Security Services....Pages 176-176
SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes....Pages 177-189
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues....Pages 190-205
Private Information Retrieval Based on the Subgroup Membership Problem....Pages 206-220
A Practical English Auction with One-Time Registration....Pages 221-234
A User Authentication Scheme with Identity and Location Privacy....Pages 235-246
An End-to-End Authentication Protocol in Wireless Application Protocol....Pages 247-259
Error Detection and Authentication in Quantum Key Distribution....Pages 260-273
An Axiomatic Basis for Reasoning about Trust in PKIs....Pages 274-291
A Knowledge-Based Approach to Internet Authorizations....Pages 292-304
Applications of Trusted Review to Information Security....Pages 305-319
Network Security Modeling and Cyber Attack Simulation Methodology....Pages 320-333
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks....Pages 334-343
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS....Pages 344-359
Improving the Availability of Time-Stamping Services....Pages 360-375
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group....Pages 376-391
Democratic Systems....Pages 392-402
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme....Pages 403-416
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates....Pages 417-434
How to Construct Fail-Stop Confirmer Signature Schemes....Pages 435-444
Signature Schemes Based on 3rd Order Shift Registers....Pages 445-459
Anonymous Statistical Survey of Attributes....Pages 460-473
Secure Mobile Agent Using Strong Non-designated Proxy Signature....Pages 474-486
Elliptic Curve Based Password Authenticated Key Exchange Protocols....Pages 487-501
Elliptic Curve Cryptography on a Palm OS Device....Pages 502-513
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field....Pages 514-520
Back Matter....Pages 521-522
....
The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001.
The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
Content:
Front Matter....Pages I-XI
A Few Thoughts on E-Commerce....Pages 1-2
New CBC-MAC Forgery Attacks....Pages 3-14
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000....Pages 15-20
Improved Cryptanalysis of the Self-Shrinking Generator....Pages 21-35
Attacks Based on Small Factors in Various Group Structures....Pages 36-50
On Classifying Conference Key Distribution Protocols....Pages 51-59
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI....Pages 60-73
New Public-Key Cryptosystem Using Divisor Class Groups....Pages 74-83
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields....Pages 84-103
Practical Key Recovery Schemes....Pages 104-114
Non-deterministic Processors....Pages 115-129
Personal Secure Booting....Pages 130-144
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules....Pages 145-158
A Strategy for MLS Workflow....Pages 159-175
Condition-Driven Integration of Security Services....Pages 176-176
SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes....Pages 177-189
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues....Pages 190-205
Private Information Retrieval Based on the Subgroup Membership Problem....Pages 206-220
A Practical English Auction with One-Time Registration....Pages 221-234
A User Authentication Scheme with Identity and Location Privacy....Pages 235-246
An End-to-End Authentication Protocol in Wireless Application Protocol....Pages 247-259
Error Detection and Authentication in Quantum Key Distribution....Pages 260-273
An Axiomatic Basis for Reasoning about Trust in PKIs....Pages 274-291
A Knowledge-Based Approach to Internet Authorizations....Pages 292-304
Applications of Trusted Review to Information Security....Pages 305-319
Network Security Modeling and Cyber Attack Simulation Methodology....Pages 320-333
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks....Pages 334-343
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS....Pages 344-359
Improving the Availability of Time-Stamping Services....Pages 360-375
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group....Pages 376-391
Democratic Systems....Pages 392-402
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme....Pages 403-416
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates....Pages 417-434
How to Construct Fail-Stop Confirmer Signature Schemes....Pages 435-444
Signature Schemes Based on 3rd Order Shift Registers....Pages 445-459
Anonymous Statistical Survey of Attributes....Pages 460-473
Secure Mobile Agent Using Strong Non-designated Proxy Signature....Pages 474-486
Elliptic Curve Based Password Authenticated Key Exchange Protocols....Pages 487-501
Elliptic Curve Cryptography on a Palm OS Device....Pages 502-513
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field....Pages 514-520
Back Matter....Pages 521-522
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001.
The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
Content:
Front Matter....Pages I-XI
A Few Thoughts on E-Commerce....Pages 1-2
New CBC-MAC Forgery Attacks....Pages 3-14
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000....Pages 15-20
Improved Cryptanalysis of the Self-Shrinking Generator....Pages 21-35
Attacks Based on Small Factors in Various Group Structures....Pages 36-50
On Classifying Conference Key Distribution Protocols....Pages 51-59
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI....Pages 60-73
New Public-Key Cryptosystem Using Divisor Class Groups....Pages 74-83
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields....Pages 84-103
Practical Key Recovery Schemes....Pages 104-114
Non-deterministic Processors....Pages 115-129
Personal Secure Booting....Pages 130-144
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules....Pages 145-158
A Strategy for MLS Workflow....Pages 159-175
Condition-Driven Integration of Security Services....Pages 176-176
SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes....Pages 177-189
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues....Pages 190-205
Private Information Retrieval Based on the Subgroup Membership Problem....Pages 206-220
A Practical English Auction with One-Time Registration....Pages 221-234
A User Authentication Scheme with Identity and Location Privacy....Pages 235-246
An End-to-End Authentication Protocol in Wireless Application Protocol....Pages 247-259
Error Detection and Authentication in Quantum Key Distribution....Pages 260-273
An Axiomatic Basis for Reasoning about Trust in PKIs....Pages 274-291
A Knowledge-Based Approach to Internet Authorizations....Pages 292-304
Applications of Trusted Review to Information Security....Pages 305-319
Network Security Modeling and Cyber Attack Simulation Methodology....Pages 320-333
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks....Pages 334-343
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS....Pages 344-359
Improving the Availability of Time-Stamping Services....Pages 360-375
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group....Pages 376-391
Democratic Systems....Pages 392-402
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme....Pages 403-416
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates....Pages 417-434
How to Construct Fail-Stop Confirmer Signature Schemes....Pages 435-444
Signature Schemes Based on 3rd Order Shift Registers....Pages 445-459
Anonymous Statistical Survey of Attributes....Pages 460-473
Secure Mobile Agent Using Strong Non-designated Proxy Signature....Pages 474-486
Elliptic Curve Based Password Authenticated Key Exchange Protocols....Pages 487-501
Elliptic Curve Cryptography on a Palm OS Device....Pages 502-513
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field....Pages 514-520
Back Matter....Pages 521-522
....
Download the book Information Security and Privacy: 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)