default search action
2. ACISP 1997: Syndey, NSW, Australia
- Vijay Varadharajan, Josef Pieprzyk, Yi Mu:
Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1270, Springer 1997, ISBN 3-540-63232-8
Keynote Lecture
- Fred Piper:
Trusted Third Parties for Secure Electronic Commerce - Are They Needed? 1
1. Security Models And Access Control
- Audun Jøsang:
Prospectives for Modelling Trust in Information Security. 2-13 - Yun Bai, Vijay Varadharajan:
Analysis and Implementation of a Formal Authorisation Policy Design Approach. 14-25 - Jonathon Tidswell, John Potter:
An Approach to Dynamic Domain and Type Enforcement. 26-37 - Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa:
Purpose-Oriented Access Control Model in Object-Based Systems. 38-49 - Masato Terada, Yuko Murayama:
User Access Domain Management Systems - ADAMS. 50-61
2. Network Security
- Aviel D. Rubin, Dan Boneh, Kevin Fu:
Revocation of Unread E-mail in an Untrusted Network. 62-75 - Vijay Varadharajan, Rajan Shankaran, Michael Hitchens:
Security Issues in Asynchronous Transfer Mode. 76-89 - Jussipekka Leiwo, Yuliang Zheng:
A Method to Implement a Denial of Service Protection Base. 90-101
3. Secure Hardware And Implementation Issues
- John Holford, George M. Mohay:
ProtectOS: Operating System and Hardware Support for Small Objects. 102-113 - Marc Fischlin:
Practical Memory Checkers for Stacks, Queues and Deques. 114-125
4. Cryptographic Functions And Ciphers
- Arjen K. Lenstra:
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields. 127-138 - Xun Yi, Kwok-Yan Lam:
A New Hash Function Based on Block Cipher. 139-146 - Xian-Mo Zhang, Yuliang Zheng:
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. 147-158 - William Millan, Ed Dawson:
On the Security of Self-Synchronous Ciphers. 159-170 - Albert Sadowski:
Inefficiency of Variant Characteristics for Substitution-Permutation Networks with Position Permutations. 171-182
5. Authentication Codes And Secret Sharing Schemes
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild:
Secret Sharing with Reusable Polynomials. 183-193 - Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk:
A Message Authentication Code Based on Latin Squares. 194-203 - Kaoru Kurosawa, Satoshi Obana:
Characterisation of (k, n) Multi-receiver Authentication. 204-215
6. Cryptanalysis
- Jen Lim, Colin Boyd, Ed Dawson:
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. 216-227 - M. Salmasidazeh, Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
Fast Correlation Attacks and Multiple Linear Approximations. 228-239
7. Key Escrow
- Wenbo Mao:
Verifiable Escrowed Signature. 240-248 - Chor Wah Man, Reihaneh Safavi-Naini:
Democratic Key Escrow Scheme. 249-260 - Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng:
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. 261-270
8. Security Protocols And Key Management
- Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai:
Protection of Data and Delegated Keys in Digital Distribution. 271-282 - Yi Mu, Vijay Varadharajan, Yan-Xia Lin:
New Micropayment Schemes Based on PayWords. 283-293 - Colin Boyd:
On Key Agreement and Conference Key Agreement. 294-302 - Shahrokh Saeednia:
Identity-Based and Self-Certified Key-Exchange Protocols. 303-313
9. Applications
- Jana Dittmann, Arnd Steinmetz:
Enabling Technology for the Trading of MPEG-encoded Video. 314-324 - Takehito Abe, Hiroshi Fujii, Kazuhiko Kushima:
Image Distribution Method with Embedded Identifier Scheme for Copyright Protection. 325-336
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.