Table of contents

  1. Front Matter
  2. Per Kaijser
    Pages 1-8
  3. Siguna Müller, Winfried B. Müller
    Pages 9-23
  4. Paul Ashley, Mark Vandenwauver, Bradley Broom
    Pages 24-35
  5. Jeffrey Horton, Jennifer Seberry
    Pages 48-57
  6. Xun Yi, Kwok Yan Lam, Yongfei Han
    Pages 58-67
  7. Hung -Min Sun, Shiuh -Pyng Shieh
    Pages 68-79
  8. G. Carter, E. Dawson, L. Nielsen
    Pages 80-89
  9. Uri Blumenthal, N. C. Hien, J. H. Rooney
    Pages 90-98
  10. Qi He, Katia Sycara, Zhongmin Su
    Pages 99-110
  11. Jovan Dj. Golić, Renato Menicocci
    Pages 123-134
  12. L. Simpson, J. Dj. Golić, E. Dawson
    Pages 147-158
  13. Rei Safavi-Naini, Yejing Wang
    Pages 159-168
  14. Josef Pieprzyk, Cheng Xin Qu
    Pages 169-180
  15. Rauli Kaksonen, Petri MÄhönen
    Pages 193-204
  16. Martin Manninger, Robert Schischka
    Pages 205-214

About these proceedings


This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.


Cryptanalysis Cryptosystems Data Encryption Information Security Telecommunication Services cryptography data security information privacy

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment