توضیحاتی در مورد کتاب Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings
نام کتاب : Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings
ویرایش : 1
عنوان ترجمه شده به فارسی : امنیت اطلاعات و حریم خصوصی: پنجمین کنفرانس استرالیا، ACISP 2000، بریزبن، استرالیا، 10-12 ژوئیه، 2000. مجموعه مقالات
سری : Lecture Notes in Computer Science 1841
نویسندگان : Adrian Spalka, Armin B. Cremers, Hartmut Lehmler (auth.), E. P. Dawson, A. Clark, Colin Boyd (eds.)
ناشر : Springer-Verlag Berlin Heidelberg
سال نشر : 2000
تعداد صفحات : 500
ISBN (شابک) : 3540677429 , 9783540677420
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 3 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Front Matter....Pages -
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System....Pages 1-17
Towards a New Authorisation Paradigm for Extranets....Pages 18-29
Custom Safety Policies in Safe Erlang....Pages 30-40
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring....Pages 41-48
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption....Pages 49-58
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance....Pages 59-73
High Performance Agile Crypto Modules....Pages 74-88
A Three-Party HTTP Proxy to Support Internet Content Regulation....Pages 89-96
Cryptanalysis of the m – Permutation Protection Schemes....Pages 97-111
An Implementation of Bitsliced DES on the Pentium MMX TM Processor....Pages 112-122
Securing Large E-Commerce Networks....Pages 123-133
Passive Entities: A Strategy for Electronic Payment Design....Pages 134-148
Key Recovery System for the Commercial Environment....Pages 149-162
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication....Pages 163-177
Key Management for Secure Multicast with Dynamic Controller....Pages 178-190
PKI Seeks a Trusting Relationship....Pages 191-205
The PKI Specification Dilemma: A Formal Solution....Pages 206-219
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator....Pages 220-233
Security Weaknesses in a Randomized Stream Cipher....Pages 234-241
Two-Stage Optimisation in the Design of Boolean Functions....Pages 242-254
A Novel Engine for Various Intrusion Detection Methods....Pages 255-265
Construction and Categories of Codes....Pages 266-277
Cryptanalysis of Polynomial Authentication and Signature Scheme....Pages 278-288
Secure Transactions with Mobile Agents in Hostile Environments....Pages 289-297
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability....Pages 298-312
Light Weight Broadcast Exclusion Using Secret Sharing....Pages 313-327
Cheating Prevention in Secret Sharing....Pages 328-341
On Multiplicative Secret Sharing Schemes....Pages 342-351
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures....Pages 352-367
Fail-Stop Confirmer Signatures....Pages 368-377
An Extremely Small and Efficient Identification Scheme....Pages 378-384
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme....Pages 385-399
AKA Protocols for Mobile Communications....Pages 400-411
A Three Phased Schema for Sealed Bid Auction System Design....Pages 412-426
An Online Public Auction Protocol Protecting Bidder Privacy....Pages 427-442
Algorithms to Speed Up Computations in Threshold RSA....Pages 443-456
Sharing Block Ciphers....Pages 457-470
All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce....Pages 471-476
Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society....Pages 477-486
Back Matter....Pages -