Information Security and Privacy

Lieferzeit: Lieferbar innerhalb 14 Tagen

53,49 

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4,2007, Proceedings, Lecture Notes in Computer Science 4586 – Security and Cryptology

ISBN: 3540734570
ISBN 13: 9783540734574
Herausgeber: Josef Pieprzyk/Hossein Ghodosi/Ed Dawson
Verlag: Springer Verlag GmbH
Umfang: xiv, 476 S.
Erscheinungsdatum: 15.06.2007
Auflage: 1/2007
Produktform: Kartoniert
Einband: KT

Over thirty key papers from a highly relevant conference Covers important topics such as cryptanalysis and e-commece

Artikelnummer: 4378904 Kategorie:

Beschreibung

InhaltsangabeStream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.-: A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier's Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.

Das könnte Ihnen auch gefallen …