Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Information Security and Priva...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Information Security and Privacy 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings / edited by Vijay Varadharajan, Yi Mu.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Varadharajan, Vijay
(Editor)
,
Mu, Yi
(Editor)
Format:
eBook
Language:
English
Published:
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2001.
Edition:
1st ed. 2001.
Series:
Lecture Notes in Computer Science,
2119
Springer eBook Collection.
Subjects:
Computer security.
Data encryption (Computer science).
Management information systems.
Computer science.
Computer communication systems.
Algorithms.
Computers and civilization.
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
A Few Thoughts on E-Commerce
New CBC-MAC Forgery Attacks
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Improved Cryptanalysis of the Self-Shrinking Generator
Attacks Based on Small Factors in Various Group Structures
On Classifying Conference Key Distribution Protocols
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI
New Public-Key Cryptosystem Using Divisor Class Groups
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
Practical Key Recovery Schemes
Non-deterministic Processors
Personal Secure Booting
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
A Strategy for MLS Workflow
Condition-Driven Integration of Security Services
SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
Private Information Retrieval Based on the Subgroup Membership Problem
A Practical English Auction with One-Time Registration
A User Authentication Scheme with Identity and Location Privacy
An End-to-End Authentication Protocol in Wireless Application Protocol
Error Detection and Authentication in Quantum Key Distribution
An Axiomatic Basis for Reasoning about Trust in PKIs
A Knowledge-Based Approach to Internet Authorizations
Applications of Trusted Review to Information Security
Network Security Modeling and Cyber Attack Simulation Methodology
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS
Improving the Availability of Time-Stamping Services
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
Democratic Systems
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
How to Construct Fail-Stop Confirmer Signature Schemes
Signature Schemes Based on 3rd Order Shift Registers
Anonymous Statistical Survey of Attributes
Secure Mobile Agent Using Strong Non-designated Proxy Signature
Elliptic Curve Based Password Authenticated Key Exchange Protocols
Elliptic Curve Cryptography on a Palm OS Device
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
Similar Items
Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings
Published: (2004)
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings
Published: (2010)
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Published: (2008)
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Published: (2007)
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Published: (2009)