Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. ProceedingsVijay Varadharajan, Yi Mu This book constitutes the refereed proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP 2001, held in Sydney, Australia, in July 2001. The 38 revised full papers presented together with three invited contributions were carefully reviewed and selected from a total of 91 submissions. Among the topics addressed are systems security, network security, trust and access cotrol, authentication, cryptography, cryptanalysis, digital signatures, elliptic curve cryptology, and secret sharing and threshold schemes. |
Contents
1 | |
3 | |
15 | |
21 | |
Attacks Based on Small Factors in Various Group Structures | 36 |
On Classifying Conference Key Distribution Protocols | 51 |
Pseudorandomness of MISTYType Transformations and the Block Cipher KASUMI | 60 |
New PublicKey Cryptosystem Using Divisor Class Groups | 74 |
Error Detection and Authentication in Quantum Key Distribution | 260 |
An Axiomatic Basis for Reasoning about Trust in PKIs | 274 |
A KnowledgeBased Approach to Internet Authorizations | 292 |
Applications of Trusted Review to Information Security | 305 |
Network Security Modeling and Cyber Attack Simulation Methodology | 320 |
A Countermeasure against DenialofService Attacks | 334 |
Enhanced Modes of Operation for the Encryption in HighSpeed Networks and Their Impact on QoS | 344 |
Improving the Availability of TimeStamping Services | 360 |
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields | 84 |
Practical Key Recovery Schemes | 104 |
Nondeterministic Processors | 115 |
Personal Secure Booting | 130 |
Evaluation of TamperResistant Software Deviating from Structured Programming Rules | 145 |
A Strategy for MLS Workflow | 159 |
ConditionDriven Integration of Security Services | 176 |
Secure Kernel Extension against Trojan Horses with InformationCarrying Codes | 177 |
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues | 190 |
Private Information Retrieval Based on the Subgroup Membership Problem | 206 |
A Practical English Auction with OneTime Registration | 221 |
A User Authentication Scheme with Identity and Location Privacy | 235 |
An EndtoEnd Authentication Protocol in Wireless Application Protocol | 247 |
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group | 376 |
Democratic Systems | 392 |
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme | 403 |
Provably Secure Distributed Schnorr Signatures and a t n Threshold Scheme for Implicit Certificates | 417 |
How to Construct FailStop Confirmer Signature Schemes | 435 |
Signature Schemes Based on 3rd Order Shift Registers | 445 |
Anonymous Statistical Survey of Attributes | 460 |
Secure Mobile Agent Using Strong Nondesignated Proxy Signature | 474 |
Elliptic Curve Based Password Authenticated Key Exchange Protocols | 487 |
Elliptic Curve Cryptography on a Palm OS Device | 502 |
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field | 514 |
521 | |
Other editions - View all
Information Security and Privacy: 6th Australasian Conference, ACISP 2001 ... Vijay Varadharajan,Yi Mu No preview available - 2001 |
Common terms and phrases
ACISP Advances in Cryptology algorithm Alice and Bob applications attack auction authentication bidder block cipher changeable scheme ciphertext class group collision free Computer Science construct cryptographic Cryptology cryptosystems database decryption defined denote digital signature discrete logarithm problem distributed efficient elliptic curve error execution forgery function group signature Hamming distance hash ideal IEEE implementation integer key recovery keystream LNCS method mobile agent multiple n)-threshold number fields operation output participants password permutation polynomial prime private information retrieval private key processor proof proposed protocol proxy signature public key Schnorr Schnorr signature secret key sends sifted key signature scheme signer simulation SKETHIC smartcard Springer-Verlag stream cipher tamper-resistant Theorem threshold scheme time-stamping Trojan trust user’s valid verify workflow