Advertisement

Information Security and Privacy

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings

  • Editors
  • Josef Pieprzyk
  • Hossein Ghodosi
  • Ed Dawson
Conference proceedings ACISP 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4586)

Table of contents

  1. Front Matter
  2. Stream Ciphers

    1. Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum
      Pages 1-10
    2. Sultan Zayid Al-Hinai, Ed Dawson, Matt Henricksen, Leonie Simpson
      Pages 11-28
    3. Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, D. RoyChowdhury
      Pages 29-44
  3. Hashing

    1. Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro et al.
      Pages 45-58
    2. Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
      Pages 59-67
    3. Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
      Pages 68-81
    4. Olivier Billet, Matt J. B. Robshaw, Thomas Peyrin
      Pages 82-95
  4. Biometrics

    1. Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
      Pages 96-106
    2. Jovan Dj. Golić, Madalina Baltatu
      Pages 107-121
  5. Secret Sharing

  6. Cryptanalysis

    1. Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
      Pages 143-157
    2. Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin et al.
      Pages 158-170
    3. Yongdong Wu, Feng Bao, Robert H. Deng
      Pages 171-183
  7. Public Key Cryptography

    1. Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
      Pages 184-199
    2. Ryotaro Hayashi, Keisuke Tanaka
      Pages 200-214
    3. Qiong Huang, Duncan S. Wong
      Pages 215-229
    4. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
      Pages 230-244
    5. Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
      Pages 245-258
    6. James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt
      Pages 274-292
  8. Authentication

    1. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
      Pages 308-322
    2. Sylvain Pasini, Serge Vaudenay
      Pages 338-354
    3. Akihiro Yamamura, Takashi Kurokawa, Junji Nakazato
      Pages 370-384
    4. Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
      Pages 385-399
  9. E-Commerce

    1. Stefan Brands, Liesje Demuynck, Bart De Decker
      Pages 400-415
    2. Ivan Damgård, Martin Geisler, Mikkel Krøigaard
      Pages 416-430
    3. Man Ho Au, Willy Susilo, Yi Mu
      Pages 431-445
  10. Security

    1. Suvasini Panigrahi, Amlan Kundu, Shamik Sural, A. K. Majumdar
      Pages 446-460
    2. Kannan Srinathan, Prasad Raghavendra, Pandu Rangan Chandrasekaran
      Pages 461-473
  11. Back Matter

About these proceedings

Keywords

Information Signatur anonymity authentication bilinear pairings biometrics block ciphers communication cryptanalysis cryptographic attacks cryptographic hash function data security networks privacy security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-73458-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-73457-4
  • Online ISBN 978-3-540-73458-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site