Table of contents

  1. Front Matter
  2. Jonathon Tidswell, John Potter
    Pages 26-37
  3. Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa
    Pages 38-49
  4. Masato Terada1, Yuko Murayama
    Pages 50-61
  5. Aviel D. Rubin, Dan Boneh, Kevin Fu
    Pages 62-75
  6. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    Pages 76-89
  7. Jussipekka Leiwo, Yuliang Zheng
    Pages 90-101
  8. Xun Yi, Kwok-Yan Lam
    Pages 139-146
  9. William Millan, Ed Dawson
    Pages 159-170
  10. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter Wild
    Pages 183-193
  11. S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 194-203
  12. Kaoru Kurosawa, Satoshi Obana
    Pages 204-215

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Keywords

access control authentication data security information key escrow network security security security protocols

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0027916
  • Copyright Information Springer-Verlag 1997
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-63232-0
  • Online ISBN 978-3-540-69237-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book