Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
Conference ACISP (Conference) (15th : 2010 : Sydney, N.S.W.)
Title Information security and privacy : 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5-7, 2010 ; proceedings / Ron Steinfeld, Philip Hawkes (eds.).
Imprint Berlin : Springer, 2010.

View online
View online
Conference ACISP (Conference) (15th : 2010 : Sydney, N.S.W.)
Series Lecture notes in computer science, 0302-9743 ; 6168
Lecture notes in computer science ; 6168.
Subject Data protection -- Congresses.
Data encryption (Computer science) -- Congresses.
Computer security -- Congresses.
Computer networks -- Access control -- Congresses.
Description 1 online resource (xii, 402 pages) : illustrations.
polychrome rdacc
Bibliography Note Includes bibliographical references.
Summary Annotation This book constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP 2010, held in Sydney, Australia, in July 2010. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric key encryption; hash functions; public key cryptography; protocols; and network security.
Contents Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
Note Print version record.
ISBN 9783642140815
9783642140808 (pbk.)
3642140807 (pbk.)
ISBN/ISSN 10.1007/978-3-642-14081-5
OCLC # 676700468
Additional Format Print version: Information security and privacy. Berlin : Springer, 2010 9783642140808 (OCoLC)646006883

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team