Table of contents

  1. Front Matter
  2. R. Taylor
    Pages 27-37
  3. Shin-Jia Hwang, Chin-Chen Chang
    Pages 48-55
  4. Ari Renvall, Cunsheng Ding
    Pages 56-66
  5. Ari Renvall, Cunsheng Ding
    Pages 67-78
  6. Chuan-Kun Wu, Ed Dawson
    Pages 79-86
  7. Ed Dawson, Jingmin He
    Pages 87-95
  8. Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Rei Safavi-Naini
    Pages 96-107
  9. Liqun Chen, Dieter Gollmann, Christopher J. Mitchell
    Pages 121-133
  10. Yi Mu, Vijay Varadharajan
    Pages 134-145
  11. Jovan Dj. Golić
    Pages 158-168
  12. Miodrag J. Mihaljević
    Pages 182-189
  13. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Pages 190-206
  14. Vijay Varadharajan, Phillip Allen
    Pages 207-218

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996.
The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.


Informationssicherheit Kryptographische Protokolle authentication cryptographic protocols cryptography cryptology data security information information security privacy security

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag 1996
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-61991-8
  • Online ISBN 978-3-540-49583-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book