Advertisement

Information Security and Privacy

10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings

  • Colin Boyd
  • Juan Manuel González Nieto
Conference proceedings ACISP 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)

Table of contents

  1. Front Matter
  2. Invited Talk

    1. Bob Blakley, G. R. Blakley
      Pages 1-16
  3. Network Security

    1. Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam
      Pages 17-28
    2. Vipul Goyal, Rohit Tripathy
      Pages 40-51
  4. Cryptanalysis

    1. Atsuko Miyaji, Yuuki Takano
      Pages 61-74
    2. Souradyuti Paul, Bart Preneel
      Pages 75-88
  5. Group Communications

  6. Elliptic Curve Cryptography

  7. Mobile Security

    1. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
      Pages 170-183
    2. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
      Pages 184-194
  8. Side Channel Attacks

  9. Evaluation and Biometrics

    1. Tim McComb, Luke Wildman
      Pages 230-241
    2. Russell Ang, Rei Safavi-Naini, Luke McAven
      Pages 242-252
  10. Public Key Cryptosystems

    1. Alexander W. Dent
      Pages 253-266
    2. Steven D. Galbraith, Chris Heneghan, James F. McKee
      Pages 280-292
  11. Access Control I

    1. Celia Li, Cungang Yang, Richard Cheung
      Pages 293-302
    2. Shujing Wang, Yan Zhang
      Pages 303-315
  12. Signatures I

    1. Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
      Pages 316-328
    2. Willy Susilo, Yi Mu
      Pages 329-335
  13. Invited Talk

    1. Adrian McCullagh, William Caelli
      Pages 336-357
  14. Access Control II

    1. Richard W. C. Lui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
      Pages 358-369
    2. Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou
      Pages 370-381
  15. Threshold Cryptography

    1. Chris Steketee, Jaimee Brown, Juan M. González Nieto, Paul Montague
      Pages 394-405
    2. Toshiyuki Isshiki, Keisuke Tanaka
      Pages 406-416
  16. Protocols I

    1. Guomin Yang, Duncan S. Wong, Xiaotie Deng
      Pages 417-428
  17. Group Signatures

    1. Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki
      Pages 443-454
    2. Jun Furukawa, Hideki Imai
      Pages 455-467
    3. Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
      Pages 468-480
  18. Protocols II

    1. Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
      Pages 481-493
    2. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo
      Pages 494-505
  19. Signatures II

    1. Xingyang Guo, Quan Zhang, Chaojing Tang
      Pages 506-517
  20. Invited Talk

  21. Credentials

    1. Yanjiang Yang, Feng Bao, Robert H. Deng
      Pages 537-547
    2. Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
      Pages 548-559
  22. Symmetric Cryptography

  23. Back Matter

About these proceedings

Keywords

Boolean function Information RSA Signatur algorithms authentication cryptanalysis cryptographic protocols cryptography cryptosystems data security digital signature schemes finite field organization security

Editors and affiliations

  • Colin Boyd
    • 1
  • Juan Manuel González Nieto
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/b137750
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-26547-4
  • Online ISBN 978-3-540-31684-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace