The Resource Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, edited by Yi Mu, Willy Susilo, Jennifer Seberry, (electronic resource)

Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, edited by Yi Mu, Willy Susilo, Jennifer Seberry, (electronic resource)

Label
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Title
Information Security and Privacy
Title remainder
13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings
Statement of responsibility
edited by Yi Mu, Willy Susilo, Jennifer Seberry
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security
Member of
Is Subseries of
Dewey number
005.82
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • 0bzPxvQFjb0
  • 50t0wdV8n4k
  • town2lPQOp4
Image bit depth
0
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2008
http://bibfra.me/vocab/lite/meetingName
ACISP (Conference)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Mu, Yi.
  • Susilo, Willy.
  • Seberry, Jennifer.
Series statement
Security and Cryptology
Series volume
5107
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Information Systems
  • Computer security
  • Computer Communication Networks
  • Coding theory
  • Computer software
  • Cryptology
  • Management of Computing and Information Systems
  • Systems and Data Security
  • Computer Communication Networks
  • Coding and Information Theory
  • Algorithm Analysis and Problem Complexity
Label
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, edited by Yi Mu, Willy Susilo, Jennifer Seberry, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy -- Secure Biometric Authentication with Improved Accuracy -- A Critical Analysis and Improvement of AACS Drive-Host Authentication -- Comparing the Pre- and Post-specified Peer Models for Key Agreement -- Efficient One-Round Key Exchange in the Standard Model -- On the Improvement of the BDF Attack on LSBS-RSA -- Public-Key Cryptosystems with Primitive Power Roots of Unity -- Relationship between Two Approaches for Defining the Standard Model PA-ness -- Distributed Verification of Mixing - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests for Private Datasets -- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of Reduced-Round SMS4 Block Cipher -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks against SHA-2 Hash Family -- Collisions for Round-Reduced LAKE -- Preimage Attacks on Step-Reduced MD5 -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck -- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 -- Signature Generation and Detection of Malware Families -- Reducing Payload Scans for Attack Signature Matching Using Rule Classification -- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor -- FormatShield: A Binary Rewriting Defense against Format String Attacks -- Advanced Permission-Role Relationship in Role-Based Access Control -- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases -- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) -- A Tree-Based Approach for Computing Double-Base Chains -- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves -- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation
Dimensions
unknown
Edition
1st ed. 2008.
Extent
1 online resource (XIII, 480 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540705000
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-70500-0
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000440814
  • (SSID)ssj0000318278
  • (PQKBManifestationID)11283551
  • (PQKBTitleCode)TC0000318278
  • (PQKBWorkID)10310218
  • (PQKB)10418898
  • (DE-He213)978-3-540-70500-0
  • (MiAaPQ)EBC3068679
  • (EXLCZ)991000000000440814
Label
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, edited by Yi Mu, Willy Susilo, Jennifer Seberry, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
New Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy -- Secure Biometric Authentication with Improved Accuracy -- A Critical Analysis and Improvement of AACS Drive-Host Authentication -- Comparing the Pre- and Post-specified Peer Models for Key Agreement -- Efficient One-Round Key Exchange in the Standard Model -- On the Improvement of the BDF Attack on LSBS-RSA -- Public-Key Cryptosystems with Primitive Power Roots of Unity -- Relationship between Two Approaches for Defining the Standard Model PA-ness -- Distributed Verification of Mixing - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests for Private Datasets -- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of Reduced-Round SMS4 Block Cipher -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks against SHA-2 Hash Family -- Collisions for Round-Reduced LAKE -- Preimage Attacks on Step-Reduced MD5 -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck -- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 -- Signature Generation and Detection of Malware Families -- Reducing Payload Scans for Attack Signature Matching Using Rule Classification -- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor -- FormatShield: A Binary Rewriting Defense against Format String Attacks -- Advanced Permission-Role Relationship in Role-Based Access Control -- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases -- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) -- A Tree-Based Approach for Computing Double-Base Chains -- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves -- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation
Dimensions
unknown
Edition
1st ed. 2008.
Extent
1 online resource (XIII, 480 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540705000
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-70500-0
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000440814
  • (SSID)ssj0000318278
  • (PQKBManifestationID)11283551
  • (PQKBTitleCode)TC0000318278
  • (PQKBWorkID)10310218
  • (PQKB)10418898
  • (DE-He213)978-3-540-70500-0
  • (MiAaPQ)EBC3068679
  • (EXLCZ)991000000000440814

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...