Atjaunināt sīkdatņu piekrišanu

Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings 1997 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 343 pages, height x width: 235x155 mm, weight: 1100 g, XIII, 343 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 1270
  • Izdošanas datums: 25-Jun-1997
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540632328
  • ISBN-13: 9783540632320
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 343 pages, height x width: 235x155 mm, weight: 1100 g, XIII, 343 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 1270
  • Izdošanas datums: 25-Jun-1997
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540632328
  • ISBN-13: 9783540632320
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Papildus informācija

Springer Book Archives
Keynote Lecture: Trusted third parties for secure electronic commerce - Are they needed? 1(1) Fred Piper
1. Security Models And Access Control 2(60) Prospectives for modelling trust in information security 2(12) A. Josang Analysis and implementation of a formal authorisation policy design approach 14(12) Y. Bai V. Varadharajan An approach to dynamic domain and type enforcement 26(12) J. Tidswell J. Potter Purpose-oriented access control model in object-based systems 38(12) T. Tachikawa H. Higaki M. Takizawa User access domain management system - ADAMS 50(12) M. Terada Y. Murayama
2. Network Security 62(40) Revocation of unread email in an untrusted network 62(14) A. D. Rubin D. Boneh K. Fu Security issues in asynchronous transfer mode 76(14) R. Shankaran V. Varadharajan M. Hitchens A method to implement a denial of service protection base 90(12) J. Leiwo Y. Zheng
3. Secure Hardware And Implementation Issues 102(25) Protect OS: Operating system and hardware support for small objects 102(12) J. Holford G. Mohay Practical memory checkers for stacks, queues and deques 114(12) M. Fischlin Panel Session: Cryptographic Policy Guidelines 126(1) Scott Charney (USA) Stephanie Perrin (Canada) Steve Orlowski (Australia) Norman Reaburn (Australia) Nigel Hickson (UK) Philippe Dejean (France)
4. Cryptographic Functions And Ciphers 127(56) Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields 127(12) A. K. Lenstra A new hash function based on block cipher 139(8) X. Yi K. Y. Lam New lower bounds on nonlinearity and a class of highly nonlinear functions 147(12) X. M. Zhang Y. Zheng On the security of self-synchronous ciphers 159(12) W. Millan E. Dawson Inefficiency of variant characteristics for substitution-permutation networks with position permutations 171(12) A. Sadowski
5. Authentication Codes And Secret Sharing Schemes 183(33) Secret sharing with reusable polynomials 183(11) L. Chen D. Gollmann C. J. Mitchell P. Wild A message authentication code based on Latin squares 194(10) S. Bakhtiari R. Safavi-Naini J. Pieprzyk Characterisation of (k,n) multi-receiver authentication 204(12) K. Kurosawa S. Obana
6. Cryptanalysis 216(24) Cryptanalysis of adaptive arithmetic coding encryption schemes 216(12) J. Lim C. Boyd E. Dawson Fast correlation attacks and multiple linear approximations 228(12) M. Salmasizadeh L. Simpson J. D. Golic E. Dawson
7. Key Escrow 240(31) Verifiable escrowed signature 240(9) W. Mao Democratic key escrow scheme 249(12) C. W. Man R. Safavi-Naini Design and analyses of two basic protocols for use in TTP-based key escrow 261(10) F. Bao R. Deng Y. Han A. Jeng
8. Security Protocols And Key Management 271(43) Protection of data and delegated keys in digital distribution 271(12) M. Mambo E. Okamoto K. Sakurai New micropayment schemes based on Pay Words 283(11) Y. Mu V. Varadharajan Y. -X. Lin On key agreement and conference key agreement 294(9) C. Boyd Identity-based and self-certified key-exchange protocols 303(11) S. Saeednia
9. Applications 314(23) Enabling technology for the trading of MPEG-encoded video 314(11) J. Dittmann A. Steinmetz Image distribution method with embedded identifier scheme for copyright protection 325(12) T. Abe H. Fujii K. Kushima Author Index 337