search for books and compare prices
Tables of Contents for Information Security and Privacy
Chapter/Section Title
Page #
Page Count
Network Security I
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System
1
17
Adrian Spalka
Armin B. Cremers
Hartmut Lehmler
Towards a New Authorisation Paradigm for Extranets
18
12
Richard Au
Mark Looi
Paul Ashley
Custom Safety Policies in Safe Erland
30
11
Lawrie Brown
Public Key Cryptography
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring
41
8
Heajoung Yoo
Seokhie Hong
Sangjin Lee
Jongin Lim
Okyeon Yi
Maenghee Sung
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption
49
10
Joonsang Baek
Byoungcheon Lee
Kwangjo Kim
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance
59
15
Yasuyuki Sakai
Kouichi Sakurai
Network Security II
High Performance Agile Crypto Modules
74
15
Chandana G. Gamage
Jussipekka Leiwo
Yuliang Zheng
A Three-Party HTTP Proxy to Support Internet Content Regulation
89
8
Agung Prasetijo
Paul Ashley
Mark Loo
Andrew Clark
Gary Gaskell
Cryptographic Implementation Issues
Cryptanalysis of the m-Permutation Protection Schemes
97
15
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
An Implementation of Bitsliced DES on the Pentium MMX™ Processor
112
11
Lauren May
Lyta Penna
Andrew Clark
Electronic Commerce I
Securing Large E-Commerce Networks
123
11
Panagiotis Sklavos
Aggelos Varvitsiotis
Despina Polemi
Passive Entities: A Strategy for Electronic Payment Design
134
15
Ernest Foo
Colin Boyd
Key Recovery
Key Recovery System for the Commercial Environment
149
14
Juanma Gonzalez Nieto
Kapali Viswanathan
Colin Boyd
Ed Dawson
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication
163
15
Masayuki Abe
Masayuki Kanda
Public Key Infrastructure
Key Management for Secure Multicast with Dynamic Controller
178
13
Hartono Kurnio
Rei Safavi-Naini
Willy Susilo
Huaxiong Wang
PKI Seeks a Trusting Relationship
191
15
Audun Jøsang
Ingar Glenn Pedersen
Dean Povey
The PKI Specification Dilemma: A Formal Solution
206
14
Maris A. Ozols
Marie Henderson
Chuchang Liu
Tony Cant
Boolean Functions
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator
220
14
Jovan Dj. Golic
Security Weaknesses in a Randomized Stream Cipher
234
8
Niels Ferguson
Bruce Schneier
David Wagner
Two-Stage Optimisation in the Design of Boolean Functions
242
13
John A. Clark
Jeremy L. Jacob
Intrusion Detection
A Novel Engine for Various Intrusion Detection Methods
255
11
Z. Hui
T.H. Daniel Tan
Codes
Construction and Categories of Codes
266
12
G.R. Blakley
I. Borosh
A. Klappenecker
Digital Signatures I
Cryptanalysis of Polynomial Authentication and Signature Scheme
278
11
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
Secure Transactions with Mobile Agents in Hostile Environments
289
9
Panayiotis Kotzanikolaou
Mike Burmester
Vassilios Chrissikopoulos
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability
298
15
Shirow Mitomi
Atsuko Miyaji
Secret Sharing I
Light Weight Broadcast Exclusion Using Secret Sharing
313
15
Natsume Matsuzaki
Jun Anzai
Tsutomu Matsumoto
Cheating Prevention in Secret Sharing
328
14
Hossein Ghodosi
Josef Pieprzyk
On Multiplicative Secret Sharing Schemes
342
10
Huaxiong Wang
Kwok Yan Lam
Guo-Zhen Xiao
Huanhui Zhao
Digital Signatures II
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures
352
16
Hiroshi Doi
Masahiro Mambo
Eiji Okamoto
Fail-Stop Confirmer Signatures
368
10
Yi Mu
Vijay Varadharajan
An Extremely Small and Efficient Identification Scheme
378
7
William D. Banks
Daniel Lieman
Igor E. Shparlinski
Protocols
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme
385
15
Kouichi Sakurai
Shingo Miyazaki
AKA Protocols for Mobile Communications
400
12
KookHeui Lee
Sang Jae Moon
Electronic Commerce II
A Three Phased Schema for Sealed Bid Auction System Design
412
15
Kapali Viswanathan
Colin Boyd
Ed Dawson
An Online Public Auction Protocol Protecting Bidder Privacy
427
16
Khanh Quoc Nguyen
Jacques Traore
Secret Sharing II
Algorithms to Speed Up Computations in Threshold RSA
443
14
Brian King
Sharing Block Ciphers
457
14
Ernie Brickell
Giovanni Di Crescenzo
Yair Frankel
Keynote Papers
All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce
471
6
Bob Blakley
G.R. Blakley
Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society
477
10
Alan Underwood
Author Index
487