Information Security and Privacy

Lieferzeit: Lieferbar innerhalb 14 Tagen

53,49 

Second Australasian Conference, ACISP ’97, Sydney, NSW, Australia, July 7-9,1997 Proceedings, Lecture Notes in Computer Science 1270

ISBN: 3540632328
ISBN 13: 9783540632320
Herausgeber: Vijav Varadharajan/Josef Pieprzyk/Yi Mu
Verlag: Springer Verlag GmbH
Umfang: xiii, 343 S.
Erscheinungsdatum: 25.06.1997
Produktform: Kartoniert
Einband: KT
Artikelnummer: 1507713 Kategorie:

Beschreibung

InhaltsangabeTrusted third parties for secure electronic commerce - Are they needed.- Prospectives for modelling trust in information security.- Analysis and implementation of a formal authorization policy design approach.- An approach to dynamic domain and type enforcement.- Purpose-oriented access control model in object-based systems.- User Access Domain Management System-ADAMS.- Revocation of unread e-mail in an untrusted network.- Security issues in asynchronous transfer mode.- A method to implement a denial of service protection base.- ProtectOS: Operating system and hardware support for small objects.- Practical memory checkers for stacks, queues and deques.- Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields.- A new hash function based on block cipher.- New lower bounds on nonlinearity and a class of highly nonlinear functions.- On the security of self-synchronous ciphers.- Inefficiency of variant characteristics for substitution-permutation networks with position permutations.- Secret sharing with reusable polynomials.- A message authentication code based on latin squares.- Characterization of (k, n) multi-receiver authentication.- Cryptanalysis of adaptive arithmetic coding encryption schemes.- Fast correlation attacks and multiple linear approximations.- Verifiable escrowed signature.- Democratic key escrow scheme.- Design and analyses of two basic protocols for use in TTP-based Key escrow.- Protection of data and delegated keys in digital distribution.- New micropayment schemes based on Pay Words.- On key agreement and conference key agreement.- Identity-based and self-certified key-exchange protocols.- Enabling technology for the trading of MPEG-encoded Video.- Image distribution method with embedded identifier scheme for copyright protection.

Das könnte Ihnen auch gefallen …