Information Security and Privacy [recurso electrónico] : 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings / edited by Ron Steinfeld, Philip Hawkes.

Por: Steinfeld, Ron [editor.]Colaborador(es): Hawkes, Philip [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 6168Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: XII, 403p. 40 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642140815Tema(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Computational complexity | Information Systems | Computer Science | Data Encryption | Computer Communication Networks | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Systems and Data Security | Discrete Mathematics in Computer ScienceFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.82 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTexto
Contenidos:
Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
En: Springer eBooksResumen: The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the peer-reviewedpapers, two invited speakers presented talks at the conference: Craig Gentry (IBM, USA); and Stephan Overbeek (Shear- ter Solutions, Australia). We would like to express our gratitude to Craig and Stephan for contributing their knowledge and insight, and thus expanding the horizons of the conference delegates. We would like to thank the authors of all of submission for o?ering their researchforpublicationinACISP2010.WeextendoursincerethankstotheP- gram Committee and other reviewers for the high-quality reviews and in-depth discussion. The Program Committee made use of the iChair electronic subm- sion and reviewing software written by Thomas Baign` eres and Matthieu Finiasz at EPFL, LASEC. We would like to express our thanks to Springer for conti- ing to support the ACISP conference and for help in the conference proceedings production. We also thank the Organizing Committee, led by the ACISP 2010 General Chair Josef Pieprzyk, for their contribution to the conference.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos QA76.9 .A25 (Browse shelf(Abre debajo)) 1 No para préstamo 374669-2001

Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.

The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the peer-reviewedpapers, two invited speakers presented talks at the conference: Craig Gentry (IBM, USA); and Stephan Overbeek (Shear- ter Solutions, Australia). We would like to express our gratitude to Craig and Stephan for contributing their knowledge and insight, and thus expanding the horizons of the conference delegates. We would like to thank the authors of all of submission for o?ering their researchforpublicationinACISP2010.WeextendoursincerethankstotheP- gram Committee and other reviewers for the high-quality reviews and in-depth discussion. The Program Committee made use of the iChair electronic subm- sion and reviewing software written by Thomas Baign` eres and Matthieu Finiasz at EPFL, LASEC. We would like to express our thanks to Springer for conti- ing to support the ACISP conference and for help in the conference proceedings production. We also thank the Organizing Committee, led by the ACISP 2010 General Chair Josef Pieprzyk, for their contribution to the conference.

19

Con tecnología Koha