Skip to main content
  • Conference proceedings
  • © 1997

Information Security and Privacy

Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1270)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 1997.

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-69237-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (30 papers)

  1. Front Matter

  2. An approach to dynamic domain and type enforcement

    • Jonathon Tidswell, John Potter
    Pages 26-37
  3. Purpose-oriented access control model in object-based systems

    • Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa
    Pages 38-49
  4. User Access Domain Management System-ADAMS

    • Masato Terada1, Yuko Murayama
    Pages 50-61
  5. Revocation of unread e-mail in an untrusted network

    • Aviel D. Rubin, Dan Boneh, Kevin Fu
    Pages 62-75
  6. Security issues in asynchronous transfer mode

    • Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    Pages 76-89
  7. A method to implement a denial of service protection base

    • Jussipekka Leiwo, Yuliang Zheng
    Pages 90-101
  8. A new hash function based on block cipher

    • Xun Yi, Kwok-Yan Lam
    Pages 139-146
  9. On the security of self-synchronous ciphers

    • William Millan, Ed Dawson
    Pages 159-170
  10. Secret sharing with reusable polynomials

    • Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter Wild
    Pages 183-193
  11. A message authentication code based on latin squares

    • S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 194-203
  12. Characterization of (k, n) multi-receiver authentication

    • Kaoru Kurosawa, Satoshi Obana
    Pages 204-215

Other Volumes

  1. Information Security and Privacy

    Second Australasian Conference, ACISP'97 Sydney, NSW, Australia, July 7–9, 1997 Proceedings

About this book

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Keywords

  • access control
  • authentication
  • data security
  • information
  • key escrow
  • network security
  • security
  • security protocols

Bibliographic Information

Buying options

eBook USD 74.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-69237-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.00
Price excludes VAT (USA)