Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Information Security and Priva...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings / edited by Ron Steinfeld, Philip Hawkes.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Steinfeld, Ron
(Editor)
,
Hawkes, Philip
(Editor)
Format:
eBook
Language:
English
Published:
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
Edition:
1st ed. 2010.
Series:
Security and Cryptology ;
6168
Springer eBook Collection.
Subjects:
Computer security.
Data encryption (Computer science).
Computer communication systems.
Management information systems.
Computer science.
Algorithms.
Computer science—Mathematics.
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
Symmetric Key Encryption
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
On Multidimensional Linear Cryptanalysis
Side-Channel Analysis of the K2 Stream Cipher
On Unbiased Linear Approximations
Hash Functions
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Second-Preimage Analysis of Reduced SHA-1
Some Observations on Indifferentiability
Public Key Cryptography
Adaptive and Composable Non-committing Encryptions
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles
Strong Knowledge Extractors for Public-Key Encryption Schemes
A Multi-trapdoor Commitment Scheme from the RSA Assumption
Identity-Based Chameleon Hash Scheme without Key Exposure
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Security Estimates for Quadratic Field Based Cryptosystems
Solving Generalized Small Inverse Problems
Protocols
One-Time-Password-Authenticated Key Exchange
Predicate-Based Key Exchange
Attribute-Based Authenticated Key Exchange
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Proof-of-Knowledge of Representation of Committed Value and Its Applications
Network Security
Pattern Recognition Techniques for the Classification of Malware Packers
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
Similar Items
Information Security and Privacy 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings
Published: (2001)
Information Security and Privacy 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Published: (2008)
Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings
Published: (2004)
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Published: (2007)
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Published: (2009)