Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings
Vijay Varadharajan, Yi Mu
Springer, Aug 9, 2001 - Business & Economics - 522 pages
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001. The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
What people are saying - Write a review
We haven't found any reviews in the usual places.
A Few Thoughts on ECommerce
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Attacks Based on Small Factors in Various Group Structures
27 other sections not shown
Other editions - View all
Advances in Cryptology algorithm Alice and Bob applications attack auction authentication bidder block cipher changeable scheme ciphertext class group collision free Computer Science construct cryptographic Cryptology cryptosystems database decryption defined denote digital signature discrete logarithm problem distributed efficient elliptic curve error execution forgery function group signature Hamming distance hash ideal IEEE implementation integer key recovery keystream LNCS method mobile agent multiple n)-threshold number fields operation output participants password permutation players polynomial prime private information retrieval private key processor proof proposed protocol proxy signature public key Schnorr Schnorr signature secret key sends sifted key signature scheme signer simulation SKETHIC smartcard Springer-Verlag stream cipher tamper-resistant Theorem threshold scheme time-stamping Trojan trust user's valid verify WAP client WAP server workflow