Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings

Front Cover
Springer Science & Business Media, Jun 25, 1997 - Business & Economics - 336 pages
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Prospectives for Modelling Trust in Information Security
viii
Analysis and Implementation of a Formal Authorization Policy Design Approach
14
Enforcement
26
PurposeOriented Access Control Model in ObjectBased Systems
38
User Access DomAin Management System ADAMS
50
Revocation of Unread Email in an Untrusted Network
62
Security Issues in Asynchronous Transfer Mode
76
A Method to Implement a Denial of Service Protection Base
90
Secret Sharing with Reusable Polynomials
183
A Message Authentication Code Based on Latin Squares
194
Characterization of k n Multireceiver Authentication
204
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes
216
Fast Correlation Attacks and Multiple Linear Approximations
228
Verifiable Escrowed Signature
240
Democratic Key Escrow Scheme
249
Design and Analyses of Two Basic Protocols for Use in TTPBased Key Escrow
261

Operating System and Hardware Support for Small Objects
102
Practical Memory Checkers for Stacks Queues and Deques
114
Cryptographic Policy Guidelines
126
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems over Finite Fields
127
A New Hash Function Based on Block Cipher
139
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions
147
On the Security of SelfSynchronous Ciphers
159
Inefficiency of Variant Characteristics for SubstitutionPermutation Networks with Position Permutations
171
Protection of Data and Delegated Keys in Digital Distribution
271
New Micropayment Schemes Based on Pay Words
283
On Key Agreement and Conference Key Agreement
294
IdentityBased and SelfCertified KeyExchange Protocols
303
Enabling Technology for the Trading of MPEGencoded Video
314
Image Distribution Method with Embedded Identifier Scheme for Copyright Protection
325
Author Index
337
Copyright

Other editions - View all

Common terms and phrases