Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings

Front Cover
Vijay Varadharajan, Yi Mu
Springer, May 15, 2003 - Computers - 522 pages
This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001. The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes.
 

Contents

A Few Thoughts on ECommerce
1
New CBCMAC Forgery Attacks
3
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
15
Improved Cryptanalysis of the SelfShrinking Generator
21
Attacks Based on Small Factors in Various Group Structures
36
On Classifying Conference Key Distribution Protocols
51
Pseudorandomness of MISTYType Transformations and the Block Cipher KASUMI
60
New PublicKey Cryptosystem Using Divisor Class Groups
74
Error Detection and Authentication in Quantum Key Distribution
260
An Axiomatic Basis for Reasoning about Trust in PKIs
274
A KnowledgeBased Approach to Internet Authorizations
292
Applications of Trusted Review to Information Security
305
Network Security Modeling and Cyber Attack Simulation Methodology
320
A Countermeasure against DenialofService Attacks
334
Enhanced Modes of Operation for the Encryption in HighSpeed Networks and Their Impact on QoS
344
Improving the Availability of TimeStamping Services
360

First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
84
Practical Key Recovery Schemes
104
Nondeterministic Processors
115
Personal Secure Booting
130
Evaluation of TamperResistant Software Deviating from Structured Programming Rules
145
A Strategy for MLS Workflow
159
ConditionDriven Integration of Security Services
176
Secure Kernel Extension against Trojan Horses with InformationCarrying Codes
177
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
190
Private Information Retrieval Based on the Subgroup Membership Problem
206
A Practical English Auction with OneTime Registration
221
A User Authentication Scheme with Identity and Location Privacy
235
An EndtoEnd Authentication Protocol in Wireless Application Protocol
247
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
376
Democratic Systems
392
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
403
Provably Secure Distributed Schnorr Signatures and a t n Threshold Scheme for Implicit Certificates
417
How to Construct FailStop Confirmer Signature Schemes
435
Signature Schemes Based on 3rd Order Shift Registers
445
Anonymous Statistical Survey of Attributes
460
Secure Mobile Agent Using Strong Nondesignated Proxy Signature
474
Elliptic Curve Based Password Authenticated Key Exchange Protocols
487
Elliptic Curve Cryptography on a Palm OS Device
502
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field
514
Author Index
521
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information