Franklin

Information Security and Privacy [electronic resource] : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings / edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson.

Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Format/Description:
Book
1 online resource (XIV, 476 pages)
Edition:
1st ed. 2007.
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology SL 4, 4586
Security and Cryptology ; 4586
Contained In:
Springer eBooks
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Subjects:
Data encryption (Computer science).
Management information systems.
Computer science.
Computer security.
Computer networks.
Coding theory.
Information theory.
Algorithms.
Local subjects:
Cryptology. (search)
Management of Computing and Information Systems. (search)
Systems and Data Security. (search)
Computer Communication Networks. (search)
Coding and Information Theory. (search)
Algorithm Analysis and Problem Complexity. (search)
System Details:
text file PDF
Contents:
Stream Ciphers
An Analysis of the Hermes8 Stream Ciphers
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks
Strengthening NLS Against Crossword Puzzle Attack
Hashing
A New Strategy for Finding a Differential Path of SHA-1
Preimage Attack on the Parallel FFT-Hashing Function
Second Preimages for Iterated Hash Functions and Their Implications on MACs
On Building Hash Functions from Multivariate Quadratic Equations
Biometrics
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Soft Generation of Secure Biometric Keys
Secret Sharing
Flaws in Some Secret Sharing Schemes Against Cheating
Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters
Cryptanalysis
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128
Analysis of the SMS4 Block Cipher
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
Public Key Cryptography
: A Hardware-Oriented Trapdoor Cipher
Anonymity on Paillier's Trap-Door Permutation
Generic Certificateless Key Encapsulation Mechanism
Double-Size Bipartite Modular Multiplication
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Authentication
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
Certificateless Signature Revisited
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Hash-and-Sign with Weak Hashing Made Secure
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing
Threshold Anonymous Group Identification and Zero-Knowledge Proof
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
E-Commerce
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
Efficient and Secure Comparison for On-Line Auctions
Practical Compact E-Cash
Security
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks
On Proactive Perfectly Secure Message Transmission.
Contributor:
Pieprzyk, Josef. editor., Editor,
Ghodosi, Hossein, editor., Editor,
Dawson, Ed, editor., Editor,
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
ISBN:
978-3-540-73458-1
9783540734581
Publisher Number:
10.1007/978-3-540-73458-1 doi
Access Restriction:
Restricted for use by site license.