The Resource Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings, edited by E. P. Dawson, A. Clark, Colin Boyd, (electronic resource)

Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings, edited by E. P. Dawson, A. Clark, Colin Boyd, (electronic resource)

Label
Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings
Title
Information Security and Privacy
Title remainder
5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings
Statement of responsibility
edited by E. P. Dawson, A. Clark, Colin Boyd
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Member of
http://bibfra.me/vocab/relation/corporateauthor
Dt2ESkTDAjI
Dewey number
005.8
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • JGij0vOZPek
  • o--7hxTE-EY
  • mjw1nQHo2pU
Image bit depth
0
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2000
http://bibfra.me/vocab/lite/meetingName
ACISP (Conference)
Nature of contents
dictionaries
http://bibfra.me/vocab/lite/organizationName
ACISP 2000
http://library.link/vocab/relatedWorkOrContributorName
  • ACISP 2000
  • Dawson, E. P.
  • Clark, A.
  • Boyd, Colin.
Series statement
Lecture Notes in Computer Science,
Series volume
1841
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer Communication Networks
  • Information Systems
  • Operating systems (Computers)
  • Computer software
  • Cryptology
  • Computer Communication Networks
  • Management of Computing and Information Systems
  • Operating Systems
  • Algorithm Analysis and Problem Complexity
Label
Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings, edited by E. P. Dawson, A. Clark, Colin Boyd, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Color
not applicable
Content category
text
Content type code
txt
Contents
Network Security I -- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System -- Towards a New Authorisation Paradigm for Extranets -- Custom Safety Policies in Safe Erlang -- Public Key Cryptography -- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring -- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption -- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance -- Network Security II -- High Performance Agile Crypto Modules -- A Three-Party HTTP Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis of the m – Permutation Protection Schemes -- An Implementation of Bitsliced DES on the Pentium MMXTM Processor -- Electronic Commerce I -- Securing Large E-Commerce Networks -- Passive Entities: A Strategy for Electronic Payment Design -- Key Recovery -- Key Recovery System for the Commercial Environment -- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication -- Public Key Infrastructure -- Key Management for Secure Multicast with Dynamic Controller -- PKI Seeks a Trusting Relationship -- The PKI Specification Dilemma: A Formal Solution -- Boolean Functions -- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator -- Security Weaknesses in a Randomized Stream Cipher -- Two-Stage Optimisation in the Design of Boolean Functions -- Intrusion Detection -- A Novel Engine for Various Intrusion Detection Methods -- Codes -- Construction and Categories of Codes -- Digital Signatures I -- Cryptanalysis of Polynomial Authentication and Signature Scheme -- Secure Transactions with Mobile Agents in Hostile Environments -- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability -- Secret Sharing I -- Light Weight Broadcast Exclusion Using Secret Sharing -- Cheating Prevention in Secret Sharing -- On Multiplicative Secret Sharing Schemes -- Digital Signatures II -- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures -- Fail-Stop Confirmer Signatures -- An Extremely Small and Efficient Identification Scheme -- Protocols -- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme -- AKA Protocols for Mobile Communications -- Electronic Commerce II -- A Three Phased Schema for Sealed Bid Auction System Design -- An Online Public Auction Protocol Protecting Bidder Privacy -- Secret Sharing II -- Algorithms to Speed Up Computations in Threshold RSA -- Sharing Block Ciphers -- Keynote Papers -- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce -- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society
Dimensions
unknown
Extent
1 online resource (XIII, 488 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540450306
Level of compression
uncompressed
Media category
computer
Media type code
c
Other control number
10.1007/10718964
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000548838
  • (SSID)ssj0000323999
  • (PQKBManifestationID)11242564
  • (PQKBTitleCode)TC0000323999
  • (PQKBWorkID)10303980
  • (PQKB)10326659
  • (DE-He213)978-3-540-45030-6
  • (MiAaPQ)EBC3088972
  • (EXLCZ)991000000000548838
Label
Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings, edited by E. P. Dawson, A. Clark, Colin Boyd, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Color
not applicable
Content category
text
Content type code
txt
Contents
Network Security I -- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System -- Towards a New Authorisation Paradigm for Extranets -- Custom Safety Policies in Safe Erlang -- Public Key Cryptography -- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring -- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption -- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance -- Network Security II -- High Performance Agile Crypto Modules -- A Three-Party HTTP Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis of the m – Permutation Protection Schemes -- An Implementation of Bitsliced DES on the Pentium MMXTM Processor -- Electronic Commerce I -- Securing Large E-Commerce Networks -- Passive Entities: A Strategy for Electronic Payment Design -- Key Recovery -- Key Recovery System for the Commercial Environment -- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication -- Public Key Infrastructure -- Key Management for Secure Multicast with Dynamic Controller -- PKI Seeks a Trusting Relationship -- The PKI Specification Dilemma: A Formal Solution -- Boolean Functions -- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator -- Security Weaknesses in a Randomized Stream Cipher -- Two-Stage Optimisation in the Design of Boolean Functions -- Intrusion Detection -- A Novel Engine for Various Intrusion Detection Methods -- Codes -- Construction and Categories of Codes -- Digital Signatures I -- Cryptanalysis of Polynomial Authentication and Signature Scheme -- Secure Transactions with Mobile Agents in Hostile Environments -- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability -- Secret Sharing I -- Light Weight Broadcast Exclusion Using Secret Sharing -- Cheating Prevention in Secret Sharing -- On Multiplicative Secret Sharing Schemes -- Digital Signatures II -- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures -- Fail-Stop Confirmer Signatures -- An Extremely Small and Efficient Identification Scheme -- Protocols -- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme -- AKA Protocols for Mobile Communications -- Electronic Commerce II -- A Three Phased Schema for Sealed Bid Auction System Design -- An Online Public Auction Protocol Protecting Bidder Privacy -- Secret Sharing II -- Algorithms to Speed Up Computations in Threshold RSA -- Sharing Block Ciphers -- Keynote Papers -- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce -- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society
Dimensions
unknown
Extent
1 online resource (XIII, 488 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540450306
Level of compression
uncompressed
Media category
computer
Media type code
c
Other control number
10.1007/10718964
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000548838
  • (SSID)ssj0000323999
  • (PQKBManifestationID)11242564
  • (PQKBTitleCode)TC0000323999
  • (PQKBWorkID)10303980
  • (PQKB)10326659
  • (DE-He213)978-3-540-45030-6
  • (MiAaPQ)EBC3088972
  • (EXLCZ)991000000000548838

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...