Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings
Lynn Batten, Jennifer Seberry
Springer, Aug 15, 2002 - Computer security - 514 pages
This book constitutes the refereed proceedings of the 7th Australasian Conference on Information Security and Privacy, ACISP 2002, held in Melbourne, Australia, in July 2002. The 36 revised full papers presented together with one invited paper were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on key handling, trust and secret sharing, fast computation, cryptanalysis, elliptic curves, advanced encryption standard AES, security management, authentication, oblivious transfer, and dealing with adversaries.
What people are saying - Write a review
We haven't found any reviews in the usual places.
A New Distributed Primality Test for Shared RSA Keys Using
Security Analysis and Improvement of the Global Key Recovery System
A Secure Rekeying Scheme with Key Recovery Property
27 other sections not shown
Other editions - View all
access control ACISP addition-subtraction chains Advances in Cryptology adversary algorithm Alice attack authorization binary blackmailing Boolean functions bound braid group broadcast certificate paths cheater cipher codewords Computer Science construction correlation immune Cryptography decryption decryption oracle defined denote Diffie-Hellman digital signatures distributed domain efficient elliptic curve encryption scheme equation finite field given GNUnet graph hash function host hyperelliptic curve implementation input integer isomorphism key schedule keystream Lecture Notes Lemma linear LNCS manager master key matrix method mod q multiple node Notes in Computer output Paillier cryptosystem parameters participants PKI models players polynomial prime probability problem proof proposed protected NAF protocol public key queries random oracle re-keying scalar secret key secret sharing session key side channel attack signature scheme SIM-ETHICS Springer-Verlag step stream cipher sub-shares subkey subset Theorem threshold scheme users vector