Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /

This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

Saved in:
Bibliographic Details
Main Authors: Pieprzyk, Josef. editor., Seberry, Jennifer. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 1996
Subjects:Computer science., Computer communication systems., Computer security., Data encryption (Computer science)., Computers and civilization., Management information systems., Combinatorics., Computer Science., Systems and Data Security., Data Encryption., Computer Communication Networks., Computers and Society., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/BFb0023281
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:199789
record_format koha
spelling KOHA-OAI-TEST:1997892018-07-30T23:26:34ZInformation Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings / Pieprzyk, Josef. editor. Seberry, Jennifer. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,1996.engThis book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.The changing face of information technology security -- Replicating the Kuperee authentication server for increased security and reliability -- Non-repudiation without public-key -- Investigation of non-repudiation protocols -- A dynamic secret sharing scheme with cheater detection -- A nonlinear secret sharing scheme -- The access structure of some secret-sharing schemes -- On construction of resilient functions -- Another approach to software key escrow encryption -- Cryptography based on transcendental numbers -- Breakthroughs in standardisation of IT security criteria -- Tailoring authentication protocols to match underlying mechanisms -- On the design of security protocols for mobile communications -- A framework for design of key establishment protocols -- On period of multiplexed sequences -- Edit distance correlation attacks on clock-controlled combiners with memory -- A faster cryptanalysis of the self-shrinking generator -- Modeling a multi-level secure object-oriented database using views -- Support for joint action based security policies -- Access control: The neglected frontier -- On the quantitative assessment of behavioural security -- On the modelling of preventive security based on a PC network intrusion experiment -- Evidential reasoning in network intrusion detection systems -- A group-oriented (t, n) undeniable signature scheme without trusted center -- Cryptosystems for hierarchical groups -- On selectable collisionful hash functions -- On password-based authenticated key exchange using collisionful hash functions -- A new universal test for bit strings -- An alternative model of quantum key agreement via photon coupling.This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.Computer science.Computer communication systems.Computer security.Data encryption (Computer science).Computers and civilization.Management information systems.Combinatorics.Computer Science.Systems and Data Security.Data Encryption.Computer Communication Networks.Computers and Society.Management of Computing and Information Systems.Combinatorics.Springer eBookshttp://dx.doi.org/10.1007/BFb0023281URN:ISBN:9783540495833
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Combinatorics.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Computers and Society.
Management of Computing and Information Systems.
Combinatorics.
Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Combinatorics.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Computers and Society.
Management of Computing and Information Systems.
Combinatorics.
spellingShingle Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Combinatorics.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Computers and Society.
Management of Computing and Information Systems.
Combinatorics.
Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Combinatorics.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Computers and Society.
Management of Computing and Information Systems.
Combinatorics.
Pieprzyk, Josef. editor.
Seberry, Jennifer. editor.
SpringerLink (Online service)
Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /
description This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.
format Texto
topic_facet Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Combinatorics.
Computer Science.
Systems and Data Security.
Data Encryption.
Computer Communication Networks.
Computers and Society.
Management of Computing and Information Systems.
Combinatorics.
author Pieprzyk, Josef. editor.
Seberry, Jennifer. editor.
SpringerLink (Online service)
author_facet Pieprzyk, Josef. editor.
Seberry, Jennifer. editor.
SpringerLink (Online service)
author_sort Pieprzyk, Josef. editor.
title Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /
title_short Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /
title_full Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /
title_fullStr Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /
title_full_unstemmed Information Security and Privacy [electronic resource] : First Australasian Conference, ACISP'96 Wollongong, NSW, Australia, June 24–26, 1996 Proceedings /
title_sort information security and privacy [electronic resource] : first australasian conference, acisp'96 wollongong, nsw, australia, june 24–26, 1996 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 1996
url http://dx.doi.org/10.1007/BFb0023281
work_keys_str_mv AT pieprzykjosefeditor informationsecurityandprivacyelectronicresourcefirstaustralasianconferenceacisp96wollongongnswaustraliajune24261996proceedings
AT seberryjennifereditor informationsecurityandprivacyelectronicresourcefirstaustralasianconferenceacisp96wollongongnswaustraliajune24261996proceedings
AT springerlinkonlineservice informationsecurityandprivacyelectronicresourcefirstaustralasianconferenceacisp96wollongongnswaustraliajune24261996proceedings
_version_ 1756267339308859392