Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings
Ed Dawson, Andrew Clark, Colin Boyd
Springer, Jul 31, 2000 - Business & Economics - 488 pages
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
19 pages matching bidder in this book
Results 1-3 of 19
What people are saying - Write a review
We haven't found any reviews in the usual places.
Digital Signatures I
Towards a New Authorisation Paradigm for Extranets
Public Key Cryptography
26 other sections not shown
Other editions - View all
ACISP Advances in Cryptology algorithm applications attack auction authentication authorisation token bidder bitslicing block cipher broadcast cell ciphertext communication Computer Science crypto cryptographic Cryptology cryptosystem decryption defined denote device digital signature distribution EEPROM efficient electronic ElGamal ElGamal encryption elliptic curves encryption entities extranets fail-stop group signature Hamming weight hash implementation integer Internet key distributor key escrow key recovery keystream KRAs LNCS merchant mod q multiple multisignature node non-linearity operations output paper participants path validation payment scheme permutation phase PKIX pointers polynomial private key problem proof proposed scheme protocol public key Public Key Infrastructure random numbers S-box secret key secret sharing scheme Section sensor server session key signature scheme signcryption signer Springer-Verlag St[i structure technique Theorem transaction trust undeniable signature values verify