search for books and compare prices
Tables of Contents for Information Security and Privacy
Chapter/Section Title
Page #
Page Count
Keynote Lecture: Trusted third parties for secure electronic commerce - Are they needed?
1
1
Fred Piper
1. Security Models And Access Control
2
60
Prospectives for modelling trust in information security
2
12
A. Josang
Analysis and implementation of a formal authorisation policy design approach
14
12
Y. Bai
V. Varadharajan
An approach to dynamic domain and type enforcement
26
12
J. Tidswell
J. Potter
Purpose-oriented access control model in object-based systems
38
12
T. Tachikawa
H. Higaki
M. Takizawa
User access domain management system - ADAMS
50
12
M. Terada
Y. Murayama
2. Network Security
62
40
Revocation of unread email in an untrusted network
62
14
A. D. Rubin
D. Boneh
K. Fu
Security issues in asynchronous transfer mode
76
14
R. Shankaran
V. Varadharajan
M. Hitchens
A method to implement a denial of service protection base
90
12
J. Leiwo
Y. Zheng
3. Secure Hardware And Implementation Issues
102
25
Protect OS: Operating system and hardware support for small objects
102
12
J. Holford
G. Mohay
Practical memory checkers for stacks, queues and deques
114
12
M. Fischlin
Panel Session: Cryptographic Policy Guidelines
126
1
Scott Charney (USA)
Stephanie Perrin (Canada)
Steve Orlowski (Australia)
Norman Reaburn (Australia)
Nigel Hickson (UK)
Philippe Dejean (France)
4. Cryptographic Functions And Ciphers
127
56
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields
127
12
A. K. Lenstra
A new hash function based on block cipher
139
8
X. Yi
K. Y. Lam
New lower bounds on nonlinearity and a class of highly nonlinear functions
147
12
X. M. Zhang
Y. Zheng
On the security of self-synchronous ciphers
159
12
W. Millan
E. Dawson
Inefficiency of variant characteristics for substitution-permutation networks with position permutations
171
12
A. Sadowski
5. Authentication Codes And Secret Sharing Schemes
183
33
Secret sharing with reusable polynomials
183
11
L. Chen
D. Gollmann
C. J. Mitchell
P. Wild
A message authentication code based on Latin squares
194
10
S. Bakhtiari
R. Safavi-Naini
J. Pieprzyk
Characterisation of (k,n) multi-receiver authentication
204
12
K. Kurosawa
S. Obana
6. Cryptanalysis
216
24
Cryptanalysis of adaptive arithmetic coding encryption schemes
216
12
J. Lim
C. Boyd
E. Dawson
Fast correlation attacks and multiple linear approximations
228
12
M. Salmasizadeh
L. Simpson
J. D. Golic
E. Dawson
7. Key Escrow
240
31
Verifiable escrowed signature
240
9
W. Mao
Democratic key escrow scheme
249
12
C. W. Man
R. Safavi-Naini
Design and analyses of two basic protocols for use in TTP-based key escrow
261
10
F. Bao
R. Deng
Y. Han
A. Jeng
8. Security Protocols And Key Management
271
43
Protection of data and delegated keys in digital distribution
271
12
M. Mambo
E. Okamoto
K. Sakurai
New micropayment schemes based on Pay Words
283
11
Y. Mu
V. Varadharajan
Y. -X. Lin
On key agreement and conference key agreement
294
9
C. Boyd
Identity-based and self-certified key-exchange protocols
303
11
S. Saeednia
9. Applications
314
23
Enabling technology for the trading of MPEG-encoded video
314
11
J. Dittmann
A. Steinmetz
Image distribution method with embedded identifier scheme for copyright protection
325
12
T. Abe
H. Fujii
K. Kushima
Author Index
337