Advertisement

Table of contents

  1. Front Matter
  2. William J. Caelli
    Pages 40-64
  3. Ross J. Anderson
    Pages 75-89
  4. Nigel Jefferies, Chris Mitchell, Michael Walker
    Pages 98-104
  5. Jingmin He, Ed Dawson
    Pages 105-114
  6. Jingmin He, Ed Dawson
    Pages 115-124
  7. H. M. Gustafson, E. P. Dawson, J. Dj. Golić
    Pages 132-143
  8. William Millan
    Pages 144-155
  9. Ivan B. Damgård, Lars Ramkilde Knudsen
    Pages 156-164
  10. Jovan Dj. Golić, Luke O'Connor
    Pages 174-185
  11. Jovan Dj. Golić, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Pages 186-200
  12. S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 201-214
  13. Chi-Sung Laih, Wen-Chung Kuo
    Pages 228-231

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.

Keywords

Authentication Techniques Authentikationstechniken Information Security Informationssicherheit Key Escrow Privatbereich Schlüsselhinterlegung algorithm algorithms cryptography cryptology linear optimization privacy

Bibliographic information

Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Engineering
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace