The Resource Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson, (electronic resource)

Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson, (electronic resource)

Label
Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Title
Information Security and Privacy
Title remainder
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Statement of responsibility
edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Member of
Is Subseries of
http://bibfra.me/vocab/relation/corporateauthor
eux3RD2sB04
Dewey number
005.82
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • JP68nCtNp0s
  • fXAUZfa8xZ8
  • 1IGudruEo1M
Image bit depth
0
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2007
http://bibfra.me/vocab/lite/meetingName
ACISP (Conference)
Nature of contents
dictionaries
http://bibfra.me/vocab/lite/organizationName
ACISP 2007
http://library.link/vocab/relatedWorkOrContributorName
  • Pieprzyk, Josef.
  • Ghodosi, Hossein.
  • Dawson, Ed.
Series statement
Security and Cryptology
Series volume
4586
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Information Systems
  • Computer security
  • Computer Communication Networks
  • Coding theory
  • Computer software
  • Cryptology
  • Management of Computing and Information Systems
  • Systems and Data Security
  • Computer Communication Networks
  • Coding and Information Theory
  • Algorithm Analysis and Problem Complexity
Label
Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks -- Strengthening NLS Against Crossword Puzzle Attack -- Hashing -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT-Hashing Function -- Second Preimages for Iterated Hash Functions and Their Implications on MACs -- On Building Hash Functions from Multivariate Quadratic Equations -- Biometrics -- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication -- Soft Generation of Secure Biometric Keys -- Secret Sharing -- Flaws in Some Secret Sharing Schemes Against Cheating -- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 -- Analysis of the SMS4 Block Cipher -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A Hardware-Oriented Trapdoor Cipher -- Anonymity on Paillier’s Trap-Door Permutation -- Generic Certificateless Key Encapsulation Mechanism -- Double-Size Bipartite Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM -- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards -- Authentication -- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication -- Certificateless Signature Revisited -- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak Hashing Made Secure -- “Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing -- Threshold Anonymous Group Identification and Zero-Knowledge Proof -- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks -- On Proactive Perfectly Secure Message Transmission
Dimensions
unknown
Edition
1st ed. 2007.
Extent
1 online resource (XIV, 476 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540734581
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-73458-1
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000490678
  • (SSID)ssj0000318277
  • (PQKBManifestationID)11283550
  • (PQKBTitleCode)TC0000318277
  • (PQKBWorkID)10310321
  • (PQKB)11047590
  • (DE-He213)978-3-540-73458-1
  • (MiAaPQ)EBC3061535
  • (EXLCZ)991000000000490678
Label
Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks -- Strengthening NLS Against Crossword Puzzle Attack -- Hashing -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT-Hashing Function -- Second Preimages for Iterated Hash Functions and Their Implications on MACs -- On Building Hash Functions from Multivariate Quadratic Equations -- Biometrics -- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication -- Soft Generation of Secure Biometric Keys -- Secret Sharing -- Flaws in Some Secret Sharing Schemes Against Cheating -- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 -- Analysis of the SMS4 Block Cipher -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A Hardware-Oriented Trapdoor Cipher -- Anonymity on Paillier’s Trap-Door Permutation -- Generic Certificateless Key Encapsulation Mechanism -- Double-Size Bipartite Modular Multiplication -- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography -- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM -- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards -- Authentication -- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication -- Certificateless Signature Revisited -- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak Hashing Made Secure -- “Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing -- Threshold Anonymous Group Identification and Zero-Knowledge Proof -- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions -- E-Commerce -- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users -- Efficient and Secure Comparison for On-Line Auctions -- Practical Compact E-Cash -- Security -- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks -- On Proactive Perfectly Secure Message Transmission
Dimensions
unknown
Edition
1st ed. 2007.
Extent
1 online resource (XIV, 476 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540734581
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-73458-1
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000490678
  • (SSID)ssj0000318277
  • (PQKBManifestationID)11283550
  • (PQKBTitleCode)TC0000318277
  • (PQKBWorkID)10310321
  • (PQKB)11047590
  • (DE-He213)978-3-540-73458-1
  • (MiAaPQ)EBC3061535
  • (EXLCZ)991000000000490678

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...