search for books and compare prices
Tables of Contents for Information Security and Privacy
Chapter/Section Title
Page #
Page Count
Invited Speakers
A Review of the SESAME Development
1
8
Per Kaijser
The Security of Public Key Cryptosystems Based on Integer Factorization
9
15
Siguna Muller
Winfried B. Muller
Network Security I
A Uniform Approach to Securing Unix Applications Using SESAME
24
12
Paul Ashley
Mark Vandenwaver
Bradley Broom
Integrated Management of Network and Host Based Security Mechanisms
36
12
Rainer Falk
Markus Trommer
Covert Distributed Computing Using Java Through Web Spoofing
48
10
Jeffrey Horton
Jennifer Seberry
Block Ciphers
Differential Cryptanalysis of a Block Cipher
58
10
Xun Yi
Kwok Yan Lam
Yongfei Han
On Private-Key Cryptosystems Based on Product Codes
68
12
Hung-Min Sun
Shiuh-Pyng Shieh
Key Schedules of Iterative Block Ciphers
80
10
Gary Carter
Ed Dawson
Lauren Nielsen
Network Security II
Low-Cost Secure Server Connection with Limited-Privilege Clients
90
9
Uri Blumenthal
N. C. Hien
J. H. Rooney
A Solution to Open Standard of PKI
99
12
Qi He
Katia Sycara
Zhongmin Su
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks
111
12
E. Franz
A. Graubner
A. Jerichow
A. Pfitzmann
Stream Ciphers
Correlation Attacks on Up/Down Cascades
123
12
Jovan Dj. Golic
Renato Menicocci
A Stream Cipher Based on Linear Feedback over GF(28)
135
12
Greg Rose
A Probabilistic Correlation Attack on the Shrinking Generator
147
12
L. Simpson
J. Dj. Golic
E. Dawson
Authentication Codes and Boolean Functions
Bounds and Constructions for A3-code with Multi-senders
159
10
Rei Safavi-Naini
Yejing Wang
Rotation-Symmetric Functions and Fast Hashing
169
12
Josef Pieprzyk
Cheng Xin Qu
How to Improve the Nonlinearity of Bijective S-Boxes
181
12
William Millan
Software Security and Electronic Commerce
Object Modeling of Cryptographic Algorithms with UML
193
12
Rauli Kaksonen
Petri Mahonen
Adapting an Electronic Purse for Internet Payments
205
10
Martin Manninger
Robert Schischka
LITESET: A Light-Weight Secure Electronic Transaction Protocol
215
12
Goichiro Hanaoka
Yuliang Zheng
Hideki Imai
Public Key Cryptography
Applications of Linearised and Sub-linearised Polynomials to Information Security
227
11
Marie Henderson
Protocol Failures Related to Order of Encryption and Signature: Computation of Discrete Logarithms in RSA Groups
238
12
Mark Chen
Eric Hughes
Hardware
Protection Against EEPROM Modification Attacks
250
11
W. W. Fung
J. W. Gray, III
Trends in Quantum Cryptography in Czech Republic
261
12
Jaroslav Hruby
Access Control
A High Level Language for Conventional Access Control Models
273
11
Yun Bai
Vijay Varadharajan
Fast Access Control Decisions from Delegation Certificate Databases
284
12
Tuomas Aura
Meta Objects for Access Control: Role-Based Principals
296
12
Thomas Riechmann
Jurgen Kleinoder
A Dynamically Typed Access Control Model
308
12
Jonathon E. Tidswell
John M. Potter
Protocols
Efficient Identity-Based Conference Key Distribution Protocols
320
12
Shahrokh Saeednia
Rei Safavi-Naini
A Formal Model for Systematic Design of Key Establishment Protocols
332
12
Carsten Rudolph
Key Eastablishment Protocols for Secure Mobile Communications: A Selective Survey
344
12
Colin Boyd
Anish Mathuria
Detecting Key-Dependencies
356
11
Tage Stabell-Kulø
Arne Helme
Gianluca Dini
Secret Sharing
Secret Sharing in Multilevel and Compartmented Groups
367
12
Hossein Ghodosi
Josef Pieprzyk
Rei Safavi-Naini
On Construction of Cumulative Secret Sharing Schemes
379
12
Hossein Ghodosi
Josef Pieprzyk
Rei Safavi-Naini
Huaxiong Wang
A Comment on the Efficiency of Secret Sharing Scheme over any Finite Abelian Group
391
12
Yvo Desmedt
Brian King
Wataru Kishimoto
Kaoru Kurosawa
Digital Signatures
A User Identification System Using Signature Written with Mouse
403
12
Agus Fana Syukri
Eiji Okamoto
Masahiro Mambo
On Zhang's Nonrepudiable Proxy Signature Schemes
415
8
Narn-Yih Lee
Tzonelih Hwang
Chih-Hung Wang
Author Index
423