Information Security and Privacy: 7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings

Front Cover
Lynn Batten, Jennifer Seberry
Springer, Aug 2, 2003 - Computers - 516 pages
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields
1
Security Analysis and Improvement of the Global Key Recovery System
17
The LILIII Keystream Generator
25
A Secure Rekeying Scheme with Key Recovery Property
40
Modelling Trust Structures for Public Key Infrastructures
56
Size of Broadcast in Threshold Schemes with Disenrollment
71
Requirements for Group Independent Linear Threshold Secret Sharing Schemes
89
Efficient Sharing of Encrypted Data
107
An Information Systems Setting
257
Resolving Conflicts in Authorization Delegations
271
Policy Administration Domains
286
Maintaining the Validity of Digital Signatures in B2B Applications
303
Short 3Secure Fingerprinting Codes for Copyright Protection
316
An OrderSpecified Multisignature Scheme Secure against Active Insider Attacks
328
Authenticated Operation of Open Computing Devices
346
A New Identification Scheme Based on the Bilinear DiffieHellman Problem
362

Cheating Prevention in Linear Secret Sharing
121
Note on Fast Computation of Secret RSA Exponents
136
Short OneTime Signatures with Fast Signing and Verifying
144
Cryptanalysis of Stream Cipher COS 2128 Mode I
154
The Analysis of ZhengSeberry Scheme
159
Cryptanalysis of Stream Cipher Alpha1
169
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
176
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over mathbbF_q
190
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
203
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
214
Strengthening the Key Schedule of the AES
226
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes
241
A Brief Outline of Research on Correlation Immune Functions
379
m out of n Oblivious Transfer
395
On the Security of Reduced Versions of 3Pass HAVAL
406
On Insecurity of the Side Channel Attack Countermeasure Using AdditionSubtraction Chains under Distinguishability between Addition and Doubling
420
On the Security of a Modified Paillier PublicKey Primitive
436
How to Play Sherlock Holmes in the World of Mobile Agents
449
A Practical Approach Defeating Blackmailing
464
Protecting TwoLevel Revocable PK Traitor Tracing
482
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries
497
Author Index
512
Copyright

Other editions - View all

Common terms and phrases