Coverart for item
The Resource Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, Willy Susilo, Yi Mu, Jennifer Seberry (eds.), (electronic resource)

Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, Willy Susilo, Yi Mu, Jennifer Seberry (eds.), (electronic resource)

Label
Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
Title
Information security and privacy
Title remainder
17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
Statement of responsibility
Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
Title variation
ACISP 2012
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
Member of
Cataloging source
GW5XE
Image bit depth
0
LC call number
QA76.9.A25
LC item number
A25 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
ACISP 2012
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
  • 1955-
  • 1944-
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Susilo, Willy
  • Mu, Yi
  • Seberry, Jennifer
Series statement
Lecture Notes in Computer Science,
Series volume
7372
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Data protection
  • Computer security
  • Computer security
  • Data encryption (Computer science)
  • Data protection
  • Informatique
Label
Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, Willy Susilo, Yi Mu, Jennifer Seberry (eds.), (electronic resource)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion
  • Peter Lory and Manuel Liedel
  • Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
  • Takanori Isobe and Kyoji Shibutani
  • Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia
  • Yu Sasaki, Sareh Emami, Deukjo Hong and Ashish Kumar
  • Low Data Complexity Attack on Reduced Camellia-256
  • Jiazhe Chen and Leibo Li --
  • Optimal Bounds for Multi-Prime [Phi]-Hiding Assumption
  • Kaori Tosu and Noboru Kunihiro
  • Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
  • Atsushi Fujioka, Mark Manulis, Koutarou Suzuki and Berkant Ustaoğlu
  • A Game-Theoretic Perspective on Oblivious Transfer
  • Haruna Higo, Keisuke Tanaka, Akihiro Yamada and Kenji Yasunaga
  • Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length
  • Yuji Nagashima and Noboru Kunihiro
  • An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
  • K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan and C. Pandu Rangan
  • Zero-Knowledge Protocols for the McEliece Encryption
  • Kirill Morozov and Tsuyoshi Takagi
  • Effort-Release Public-Key Encryption from Cryptographic Puzzles
  • Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González-Nieto and Lakshmi Kuppusamy
  • Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
  • Manh Ha Nguyen, Keisuke Tanaka and Kenji Yasunaga --
  • Cryptanalysis of RSA with a Small Parameter
  • Xianmeng Meng and Xuexin Zheng
  • An Algebraic Broadcast Attack against NTRU
  • Jintai Ding, Yanbin Pan and Yingpu Deng
  • Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers
  • Mufeed ALMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson and Kenneth Koon-Ho Wong
  • Weimar-DM: A Highly Secure Double-Length Compression Function
  • Ewan Fleischmann, Christian Forler, Stefan Lucks and Jakob Wenzel
  • Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
  • S. Sharmila Deva Selvi, S. Sree Vivek and C. Pandu Rangan
  • Fully Leakage-Resilient Signatures with Auxiliary Inputs
  • Tsz Hon Yuen, Siu Ming Yiu and Lucas C. K. Hui
  • Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
  • Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti and Mario Strefler
  • A Generic Construction of Accountable Decryption and Its Applications
  • Xuhua Zhou, Xuhua Ding and Kefei Chen --
  • How to Fix Two RSA-Based PVSS Schemes--Exploration and Solution
  • Kun Peng and Matt Henricksen
  • Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
  • Kaoru Kurosawa, Ryo Nojima and Le Trieu Phong
  • Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes
  • Xiao Tan and Duncan S. Wong
  • A Short Non-delegatable Strong Designated Verifier Signature
  • Haibo Tian, Xiaofeng Chen and Jin Li
  • Revocable Identity-Based Encryption from Lattices
  • Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang and Khoa Nguyen
  • On Area, Time, and the Right Trade-Off
  • A. Poschmann and M. J. B. Robshaw
  • Analysis of Xorrotation with Application to an HC-128 Variant
  • Paul Stankovski, Martin Hell and Thomas Johansson
  • Private Fingerprint Matching
  • Siamak F. Shahandashti, Reihaneh Safavi-Naini and Philip Ogunbona
  • Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking
  • Kaleb Lee, Colin Boyd and Juan Manule González-Nieto
  • Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
  • ICAF: A Context-Aware Framework for Access Control
  • A. S. M. Kayes, Jun Han and Alan Colman
  • Non-malleable Instance-Dependent Commitment in the Standard Model
  • Wenpan Jing, Haixia Xu and Bao Li
  • Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma and Zhenfeng Zhang
  • Fully Private Revocable Predicate Encryption
  • Juan Manuel González-Nieto, Mark Manulis and Dongdong Sun
  • Anonymous ID-Based Proxy Re-Encryption
  • Jun Shao
  • On the Optimality of Lattices for the Coppersmith Technique
  • Yoshinori Aono, Manindra Agrawal, Takakazu Satoh and Osamu Watanabe
Dimensions
unknown
Extent
1 online resource (xiv, 460 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642314483
Level of compression
uncompressed
Other control number
10.1007/978-3-642-31448-3
Other physical details
ill.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)799876770
  • (OCoLC)ocn799876770
Label
Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, Willy Susilo, Yi Mu, Jennifer Seberry (eds.), (electronic resource)
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion
  • Peter Lory and Manuel Liedel
  • Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
  • Takanori Isobe and Kyoji Shibutani
  • Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia
  • Yu Sasaki, Sareh Emami, Deukjo Hong and Ashish Kumar
  • Low Data Complexity Attack on Reduced Camellia-256
  • Jiazhe Chen and Leibo Li --
  • Optimal Bounds for Multi-Prime [Phi]-Hiding Assumption
  • Kaori Tosu and Noboru Kunihiro
  • Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
  • Atsushi Fujioka, Mark Manulis, Koutarou Suzuki and Berkant Ustaoğlu
  • A Game-Theoretic Perspective on Oblivious Transfer
  • Haruna Higo, Keisuke Tanaka, Akihiro Yamada and Kenji Yasunaga
  • Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length
  • Yuji Nagashima and Noboru Kunihiro
  • An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
  • K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan and C. Pandu Rangan
  • Zero-Knowledge Protocols for the McEliece Encryption
  • Kirill Morozov and Tsuyoshi Takagi
  • Effort-Release Public-Key Encryption from Cryptographic Puzzles
  • Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González-Nieto and Lakshmi Kuppusamy
  • Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
  • Manh Ha Nguyen, Keisuke Tanaka and Kenji Yasunaga --
  • Cryptanalysis of RSA with a Small Parameter
  • Xianmeng Meng and Xuexin Zheng
  • An Algebraic Broadcast Attack against NTRU
  • Jintai Ding, Yanbin Pan and Yingpu Deng
  • Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers
  • Mufeed ALMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson and Kenneth Koon-Ho Wong
  • Weimar-DM: A Highly Secure Double-Length Compression Function
  • Ewan Fleischmann, Christian Forler, Stefan Lucks and Jakob Wenzel
  • Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
  • S. Sharmila Deva Selvi, S. Sree Vivek and C. Pandu Rangan
  • Fully Leakage-Resilient Signatures with Auxiliary Inputs
  • Tsz Hon Yuen, Siu Ming Yiu and Lucas C. K. Hui
  • Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
  • Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti and Mario Strefler
  • A Generic Construction of Accountable Decryption and Its Applications
  • Xuhua Zhou, Xuhua Ding and Kefei Chen --
  • How to Fix Two RSA-Based PVSS Schemes--Exploration and Solution
  • Kun Peng and Matt Henricksen
  • Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
  • Kaoru Kurosawa, Ryo Nojima and Le Trieu Phong
  • Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes
  • Xiao Tan and Duncan S. Wong
  • A Short Non-delegatable Strong Designated Verifier Signature
  • Haibo Tian, Xiaofeng Chen and Jin Li
  • Revocable Identity-Based Encryption from Lattices
  • Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang and Khoa Nguyen
  • On Area, Time, and the Right Trade-Off
  • A. Poschmann and M. J. B. Robshaw
  • Analysis of Xorrotation with Application to an HC-128 Variant
  • Paul Stankovski, Martin Hell and Thomas Johansson
  • Private Fingerprint Matching
  • Siamak F. Shahandashti, Reihaneh Safavi-Naini and Philip Ogunbona
  • Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking
  • Kaleb Lee, Colin Boyd and Juan Manule González-Nieto
  • Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
  • ICAF: A Context-Aware Framework for Access Control
  • A. S. M. Kayes, Jun Han and Alan Colman
  • Non-malleable Instance-Dependent Commitment in the Standard Model
  • Wenpan Jing, Haixia Xu and Bao Li
  • Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma and Zhenfeng Zhang
  • Fully Private Revocable Predicate Encryption
  • Juan Manuel González-Nieto, Mark Manulis and Dongdong Sun
  • Anonymous ID-Based Proxy Re-Encryption
  • Jun Shao
  • On the Optimality of Lattices for the Coppersmith Technique
  • Yoshinori Aono, Manindra Agrawal, Takakazu Satoh and Osamu Watanabe
Dimensions
unknown
Extent
1 online resource (xiv, 460 p.)
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642314483
Level of compression
uncompressed
Other control number
10.1007/978-3-642-31448-3
Other physical details
ill.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)799876770
  • (OCoLC)ocn799876770

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...