Advertisement

Table of contents

  1. Front Matter
  2. Per Kaijser
    Pages 1-8
  3. Siguna Müller, Winfried B. Müller
    Pages 9-23
  4. Paul Ashley, Mark Vandenwauver, Bradley Broom
    Pages 24-35
  5. Jeffrey Horton, Jennifer Seberry
    Pages 48-57
  6. Xun Yi, Kwok Yan Lam, Yongfei Han
    Pages 58-67
  7. Hung -Min Sun, Shiuh -Pyng Shieh
    Pages 68-79
  8. G. Carter, E. Dawson, L. Nielsen
    Pages 80-89
  9. Uri Blumenthal, N. C. Hien, J. H. Rooney
    Pages 90-98
  10. Qi He, Katia Sycara, Zhongmin Su
    Pages 99-110
  11. Jovan Dj. Golić, Renato Menicocci
    Pages 123-134
  12. L. Simpson, J. Dj. Golić, E. Dawson
    Pages 147-158
  13. Rei Safavi-Naini, Yejing Wang
    Pages 159-168
  14. Josef Pieprzyk, Cheng Xin Qu
    Pages 169-180
  15. Rauli Kaksonen, Petri MÄhönen
    Pages 193-204
  16. Martin Manninger, Robert Schischka
    Pages 205-214
  17. Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    Pages 215-226
  18. W. W. Fung, J. W. Gray III
    Pages 250-260
  19. Yun Bai, Vijay Varadharajan
    Pages 273-283
  20. Thomas Riechmann, Jürgen Kleinöder
    Pages 296-307
  21. Jonathon E. Tidswell, John M. Potter
    Pages 308-319
  22. Shahrokh Saeednia, Rei Safavi-Naini
    Pages 320-331
  23. Tage Stabell-Kute, Arne Helme, Gianluca Dini
    Pages 356-366
  24. Hossein Ghodosi, Josef Pieprzyk, Rei Safavi-Naini
    Pages 367-378
  25. Hossein Ghodosi, Josef Pieprzyk, Rei Safavi-Naini, Huaxiong Wang
    Pages 379-390
  26. Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa
    Pages 391-402
  27. Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo
    Pages 403-414
  28. Nam -Yih Lee, Tzonelih Hwang, Chih -Hung Wang
    Pages 415-422
  29. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.

Keywords

Cryptanalysis Cryptosystems Data Encryption Information Security Telecommunication Services cryptography data security information privacy

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0053715
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-64732-4
  • Online ISBN 978-3-540-69101-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site