Advertisement

Table of contents

  1. Front Matter
  2. R. Taylor
    Pages 27-37
  3. Shin-Jia Hwang, Chin-Chen Chang
    Pages 48-55
  4. Ari Renvall, Cunsheng Ding
    Pages 56-66
  5. Ari Renvall, Cunsheng Ding
    Pages 67-78
  6. Chuan-Kun Wu, Ed Dawson
    Pages 79-86
  7. Ed Dawson, Jingmin He
    Pages 87-95
  8. Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Rei Safavi-Naini
    Pages 96-107
  9. Liqun Chen, Dieter Gollmann, Christopher J. Mitchell
    Pages 121-133
  10. Yi Mu, Vijay Varadharajan
    Pages 134-145
  11. Jovan Dj. Golić
    Pages 158-168
  12. Miodrag J. Mihaljević
    Pages 182-189
  13. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Pages 190-206
  14. Vijay Varadharajan, Phillip Allen
    Pages 207-218
  15. Ravi Sandhu
    Pages 219-227
  16. Erland Jonsson, Mikael Andersson
    Pages 228-241
  17. Ulf Gustafson, Erland Jonsson, Tomas Olovsson
    Pages 242-252
  18. Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk
    Pages 253-265
  19. Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang
    Pages 266-274
  20. Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Rei Safavi-Naini
    Pages 275-286
  21. S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 287-298
  22. S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 299-310
  23. Babak Sadeghiyan, Javad Mohajeri
    Pages 311-319
  24. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

Keywords

Informationssicherheit Kryptographische Protokolle authentication cryptographic protocols cryptography cryptology data security information information security privacy security

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0023281
  • Copyright Information Springer-Verlag Berlin Heidelberg 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-61991-8
  • Online ISBN 978-3-540-49583-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering