Advertisement

Information Security and Privacy

5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings

  • E. P. Dawson
  • A. Clark
  • Colin Boyd
Conference proceedings ACISP 2000

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1841)

Table of contents

  1. Front Matter
  2. Network Security I

    1. Richard Au, Mark Looi, Paul Ashley
      Pages 18-29
    2. Lawrie Brown
      Pages 30-40
  3. Public Key Cryptography

    1. Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jongin Lim, Okyeon Yi, Maenghee Sung
      Pages 41-48
  4. Network Security II

    1. Chandana G. Gamage, Jussipekka Leiwo, Yuliang Zheng
      Pages 74-88
    2. Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
      Pages 89-96
  5. Cryptographic Implementation Issues

    1. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
      Pages 97-111
    2. Lauren May, Lyta Penna, Andrew Clark
      Pages 112-122
  6. Electronic Commerce I

    1. Panagiotis Sklavos, Aggelos Varvitsiotis, Despina Polemi
      Pages 123-133
    2. Ernest Foo, Colin Boyd
      Pages 134-148
  7. Key Recovery

    1. Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 149-162
  8. Public Key Infrastructure

    1. Hartono Kurnio, Rei Safavi-Naini, Willy Susilo, Huaxiong Wang
      Pages 178-190
    2. Audun Jøsang, Ingar Glenn Pedersen, Dean Povey
      Pages 191-205
    3. Maris A. Ozols, Marie Henderson, Chuchang Liu, Tony Cant
      Pages 206-219
  9. Boolean Functions

    1. Niels Ferguson, Bruce Schneier, David Wagner
      Pages 234-241
    2. John A Clark, Jeremy L Jacob
      Pages 242-254
  10. Intrusion Detection

    1. Zhu Hui, T. H. Daniel Tan
      Pages 255-265
  11. Codes

    1. G. R. Blakley, I. Borosh, A. Klappenecker
      Pages 266-277
  12. Digital Signatures I

    1. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
      Pages 278-288
    2. Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos
      Pages 289-297
  13. Secret Sharing I

    1. Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto
      Pages 313-327
    2. Hossein Ghodosi, Josef Pieprzyk
      Pages 328-341
    3. Huaxiong Wang, Kwok Yan Lam, Guo-Zhen Xiao, Huanhui Zhao
      Pages 342-351
  14. Digital Signatures II

    1. Hiroshi Doi, Masahiro Mambo, Eiji Okamoto
      Pages 352-367
    2. Yi Mu, Vijay Varadharajan
      Pages 368-377
    3. William D. Banks, Daniel Lieman, Igor E. Shparlinski
      Pages 378-384
  15. Protocols

    1. KookHeui Lee, SangJae Moon
      Pages 400-411
  16. Electronic Commerce II

    1. Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 412-426
    2. Khanh Quoc Nguyen, Jacques Traoré
      Pages 427-442
  17. Secret Sharing II

    1. Ernie Brickell, Giovanni Di Crescenzo, Yair Frankel
      Pages 457-470
  18. Keynote Papers

  19. Back Matter

About these proceedings

Keywords

Boolean function Cryptanalysis Cryptographic Protocols Cryptology Digital Payment Electronic Commerce Information Security Public Key Cryptography Secure Networks System Security cryptography data security privacy

Editors and affiliations

  • E. P. Dawson
    • 1
  • A. Clark
    • 1
  • Colin Boyd
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/10718964
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-67742-0
  • Online ISBN 978-3-540-45030-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace