The Resource Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings, edited by Colin Boyd, Juan González Nieto, (electronic resource)

Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings, edited by Colin Boyd, Juan González Nieto, (electronic resource)

Label
Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Title
Information Security and Privacy
Title remainder
14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Statement of responsibility
edited by Colin Boyd, Juan González Nieto
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009. The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation
Member of
Is Subseries of
Dewey number
004.6
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • mjw1nQHo2pU
  • jFKrYuFhwVY
Image bit depth
0
Language note
English
LC call number
TK5105.5-5105.9
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingName
ACISP 2009
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • ACISP 2009
  • Boyd, Colin.
  • González Nieto, Juan.
Series statement
Security and Cryptology
Series volume
5594
http://library.link/vocab/subjectName
  • Computer Communication Networks
  • Computer security
  • Data encryption (Computer science)
  • Information Systems
  • Coding theory
  • Computer software
  • Computer Communication Networks
  • Systems and Data Security
  • Cryptology
  • Management of Computing and Information Systems
  • Coding and Information Theory
  • Algorithm Analysis and Problem Complexity
Label
Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings, edited by Colin Boyd, Juan González Nieto, (electronic resource)
Instantiates
Publication
Note
Description based on print version record
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited
Dimensions
unknown
Edition
1st ed. 2009.
Extent
1 online resource (XI, 470 p.)
File format
multiple file formats
Form of item
online
Isbn
9783642026201
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-642-02620-1
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000753977
  • (SSID)ssj0000318279
  • (PQKBManifestationID)11231736
  • (PQKBTitleCode)TC0000318279
  • (PQKBWorkID)10308554
  • (PQKB)10271188
  • (DE-He213)978-3-642-02620-1
  • (MiAaPQ)EBC3064361
  • (EXLCZ)991000000000753977
Label
Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings, edited by Colin Boyd, Juan González Nieto, (electronic resource)
Publication
Note
Description based on print version record
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited
Dimensions
unknown
Edition
1st ed. 2009.
Extent
1 online resource (XI, 470 p.)
File format
multiple file formats
Form of item
online
Isbn
9783642026201
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-642-02620-1
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000753977
  • (SSID)ssj0000318279
  • (PQKBManifestationID)11231736
  • (PQKBTitleCode)TC0000318279
  • (PQKBWorkID)10308554
  • (PQKB)10271188
  • (DE-He213)978-3-642-02620-1
  • (MiAaPQ)EBC3064361
  • (EXLCZ)991000000000753977

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...