Information Security and Privacy

8th Australasian Conference, ACISP 2003 Wollongong, Australia, July 9–11, 2003 Proceedings

Editors:

ISBN: 978-3-540-40515-3 (Print) 978-3-540-45067-2 (Online)

Table of contents (45 chapters)

previous Page of 3
  1. Privacy and Anonymity

    1. No Access

      Book Chapter

      Pages 1-12

      Grouping Verifiable Content for Selective Disclosure

    2. No Access

      Book Chapter

      Pages 13-26

      Evaluation of Anonymity of Practical Anonymous Communication Networks

    3. No Access

      Book Chapter

      Pages 27-38

      An Anonymous Credential System and a Privacy-Aware PKI

    4. No Access

      Book Chapter

      Pages 39-50

      Flaws in Some Robust Optimistic Mix-Nets

  2. Invited Talk (I)

    1. No Access

      Book Chapter

      Pages 51-54

      The Unsolvable Privacy Problem and Its Implications for Security Technologies

  3. Elliptic Curves

    1. No Access

      Book Chapter

      Pages 55-66

      The Security of Fixed versus Random Elliptic Curves in Cryptography

    2. No Access

      Book Chapter

      Pages 67-78

      Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains

    3. No Access

      Book Chapter

      Pages 79-92

      Generic GF(2m) Arithmetic in Software and Its Application to ECC

    4. No Access

      Book Chapter

      Pages 93-105

      An Addition Algorithm in Jacobian of C 34 Curve

  4. Crytpanalysis (I)

    1. No Access

      Book Chapter

      Pages 106-117

      Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces

    2. No Access

      Book Chapter

      Pages 118-129

      Differential Fault Analysis on AES Key Schedule and Some Countermeasures

    3. No Access

      Book Chapter

      Pages 130-141

      On the Pseudorandomness of KASUMI Type Permutations

    4. No Access

      Book Chapter

      Pages 142-153

      Theoretical Analysis of η2 Attack on RC6

  5. Mobile and Network Security

    1. No Access

      Book Chapter

      Pages 154-165

      A Typed Theory for Access Control and Information Flow Control in Mobile Systems

    2. No Access

      Book Chapter

      Pages 166-179

      Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach

    3. No Access

      Book Chapter

      Pages 180-191

      Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications

    4. No Access

      Book Chapter

      Pages 192-203

      Practical Pay TV Schemes

    5. No Access

      Book Chapter

      Pages 204-213

      Cooperative Routers against DoS Attacks

    6. No Access

      Book Chapter

      Pages 214-225

      Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs

    7. No Access

      Book Chapter

      Pages 226-236

      Malicious ICMP Tunneling: Defense against the Vulnerability

previous Page of 3