Wonder Club world wonders pyramid logo
×

Information Security and Privacy, Vol. 143 Book

Information Security and Privacy, Vol. 143
Information Security and Privacy, Vol. 143, This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submis, Information Security and Privacy, Vol. 143 has a rating of 2 stars
   2 Ratings
X
Information Security and Privacy, Vol. 143, This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998. The volume presents 35 revised full papers selected from a total of 66 submis, Information Security and Privacy, Vol. 143
2 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
0 %
2
100 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Information Security and Privacy, Vol. 143
  • Written by author Colin Boyd
  • Published by Springer-Verlag New York, LLC, November 2007
  • This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998. The volume presents 35 revised full papers selected from a total of 66 submis
  • This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.The 45 revised full papers presented together with 3 invited papers were carefu
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

All sail, no anchor III : risk aggregation and time's arrow1
Traversing middleboxes with the host identity protocol17
An investigation of unauthorised use of wireless networks in Adelaide, South Australia29
An efficient solution to the ARP cache poisoning problem40
On Stern's attack against secret truncated linear congruential generators52
On the success probability of [chi][superscript 2]-attack on RC661
Solving systems of differential equations of addition75
A tree based one-key broadcast encryption scheme with low computational overhead89
Dynamic group key agreement in tree-based setting101
Immediate data authentication for multicast in resource constrained network113
Redundant trinomials for finite fields of characteristic 2122
Efficient Tate pairing computation for elliptic curves over binary fields134
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two146
Using "fair forfeit" to prevent truncation attacks on mobile agents158
An improved execution integrity solution for mobile agents170
RFID guardian : a battery-powered mobile device for RFID privacy management184
Enhanced DES implementation secure against high-order differential power analysis in smartcards195
Improved zero value attack on XTR207
Efficient representations on Koblitz curves with resistance to side channel attacks218
SIFA : a tool for evaluation of high-grade security devices230
Cancelable key-based fingerprint templates242
Hybrid signcryption schemes with insider security253
On the possibility of constructing meaningful hash collisions for public keys267
Tunable balancing of RSA280
Key management for role hierarchy in distributed systems293
A formalization of distributed authorization with delegation303
Two improved partially blind signature schemes from bilinear pairings316
On the security of nominative signatures329
Who goes there? : Internet banking : a matter of risk and reward336
Role activation management in role based access control358
VO-Sec : an access control framework for dynamic virtual organization370
An efficient implementation of a threshold RSA signature scheme382
GBD threshold cryptography with an application to RSA key recovery394
An (n - t)-out-of-n threshold ring signature scheme406
Deposit-case attack against secure roaming417
Security requirements for key establishment proof models : revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols429
Group signature schemes with membership revocation for large groups443
An efficient group signature scheme from bilinear maps455
Group signature where group manager, members and open authority are identity-based468
Analysis of the HIP base exchange protocol481
ID-based authenticated key agreement for low-power mobile devices494
On the security of two key-updating signature schemes506
Building secure tame-like multivariate public-key cryptosystems : the new TTS518
Potential impacts of a growing gap between theory and practice in information security532
Security analysis and fix of an anonymous credential system537
Counting abuses using flexible off-line credentials548
Cryptanalysis of two variants of PCBC mode when used for message integrity560
New cryptographic applications of Boolean function equivalence classes572


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Information Security and Privacy, Vol. 143, This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submis, Information Security and Privacy, Vol. 143

X
WonderClub Home

This item is in your Collection

Information Security and Privacy, Vol. 143, This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submis, Information Security and Privacy, Vol. 143

Information Security and Privacy, Vol. 143

X
WonderClub Home

This Item is in Your Inventory

Information Security and Privacy, Vol. 143, This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submis, Information Security and Privacy, Vol. 143

Information Security and Privacy, Vol. 143

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: