Information Security and Privacy

10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings

  • Colin Boyd
  • Juan Manuel González Nieto
Conference proceedings ACISP 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)

Table of contents

  1. Front Matter
  2. Invited Talk

    1. Bob Blakley, G. R. Blakley
      Pages 1-16
  3. Network Security

    1. Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam
      Pages 17-28
    2. Vipul Goyal, Rohit Tripathy
      Pages 40-51
  4. Cryptanalysis

    1. Atsuko Miyaji, Yuuki Takano
      Pages 61-74
    2. Souradyuti Paul, Bart Preneel
      Pages 75-88
  5. Group Communications

  6. Elliptic Curve Cryptography

  7. Mobile Security

    1. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
      Pages 170-183
    2. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
      Pages 184-194
  8. Side Channel Attacks

About these proceedings

Keywords

Boolean function Information RSA Signatur algorithms authentication cryptanalysis cryptographic protocols cryptography cryptosystems data security digital signature schemes finite field organization security

Editors and affiliations

  • Colin Boyd
    • 1
  • Juan Manuel González Nieto
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/b137750
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-26547-4
  • Online ISBN 978-3-540-31684-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace