Advertisement

Table of contents

  1. Front Matter
  2. William J. Caelli
    Pages 40-64
  3. Ross J. Anderson
    Pages 75-89
  4. Nigel Jefferies, Chris Mitchell, Michael Walker
    Pages 98-104
  5. Jingmin He, Ed Dawson
    Pages 105-114
  6. Jingmin He, Ed Dawson
    Pages 115-124
  7. H. M. Gustafson, E. P. Dawson, J. Dj. Golić
    Pages 132-143
  8. William Millan
    Pages 144-155
  9. Ivan B. Damgård, Lars Ramkilde Knudsen
    Pages 156-164
  10. Jovan Dj. Golić, Luke O'Connor
    Pages 174-185
  11. Jovan Dj. Golić, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Pages 186-200
  12. S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 201-214
  13. Chi-Sung Laih, Wen-Chung Kuo
    Pages 228-231
  14. Lidong Chen
    Pages 232-243
  15. Kefei Chen
    Pages 244-249
  16. Andreas Fuchsberger, Dieter Gollmann, Paul Lothian, Kenneth G. Paterson, Abraham Sidiropoulos
    Pages 250-269
  17. Gary Gaskell, Mark Looi
    Pages 270-281
  18. Dieter Gollmann
    Pages 290-300
  19. G. Mohay, H. Morarji, Q. Le-Viet, L. Munday, W. Caelli
    Pages 313-325
  20. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.

Keywords

Authentication Techniques Authentikationstechniken Information Security Informationssicherheit Key Escrow Privatbereich Schlüsselhinterlegung algorithm algorithms cryptography cryptology linear optimization privacy

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0032342
  • Copyright Information Springer-Verlag Berlin Heidelberg 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-60759-5
  • Online ISBN 978-3-540-49363-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering