Skip to main content
  • Conference proceedings
  • © 2005

Information Security and Privacy

10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3574)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (48 papers)

  1. Front Matter

  2. Invited Talk

    1. All Sail, No Anchor III: Risk Aggregation and Time’s Arrow

      • Bob Blakley, G. R. Blakley
      Pages 1-16
  3. Network Security

    1. Traversing Middleboxes with the Host Identity Protocol

      • Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam
      Pages 17-28
    2. An Efficient Solution to the ARP Cache Poisoning Problem

      • Vipul Goyal, Rohit Tripathy
      Pages 40-51
  4. Cryptanalysis

    1. On the Success Probability of χ 2-attack on RC6

      • Atsuko Miyaji, Yuuki Takano
      Pages 61-74
    2. Solving Systems of Differential Equations of Addition

      • Souradyuti Paul, Bart Preneel
      Pages 75-88
  5. Group Communications

    1. Dynamic Group Key Agreement in Tree-Based Setting

      • Ratna Dutta, Rana Barua
      Pages 101-112
  6. Elliptic Curve Cryptography

    1. A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two

      • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
      Pages 146-157
  7. Mobile Security

    1. An Improved Execution Integrity Solution for Mobile Agents

      • Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
      Pages 170-183
    2. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management

      • Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
      Pages 184-194
  8. Side Channel Attacks

    1. Improved Zero Value Attack on XTR

      • Régis Bevan
      Pages 207-217
    2. Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks

      • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
      Pages 218-229

Other Volumes

  1. Information Security and Privacy

Editors and Affiliations

  • Information Security Institute, Queensland University of Technology, Brisbane, Australia

    Colin Boyd, Juan Manuel González Nieto

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access