Skip to main content
  • Conference proceedings
  • © 1997

Information Security and Privacy

Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1270)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 1997.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. An approach to dynamic domain and type enforcement

    • Jonathon Tidswell, John Potter
    Pages 26-37
  3. Purpose-oriented access control model in object-based systems

    • Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa
    Pages 38-49
  4. User Access Domain Management System-ADAMS

    • Masato Terada1, Yuko Murayama
    Pages 50-61
  5. Revocation of unread e-mail in an untrusted network

    • Aviel D. Rubin, Dan Boneh, Kevin Fu
    Pages 62-75
  6. Security issues in asynchronous transfer mode

    • Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    Pages 76-89
  7. A method to implement a denial of service protection base

    • Jussipekka Leiwo, Yuliang Zheng
    Pages 90-101
  8. A new hash function based on block cipher

    • Xun Yi, Kwok-Yan Lam
    Pages 139-146
  9. On the security of self-synchronous ciphers

    • William Millan, Ed Dawson
    Pages 159-170
  10. Secret sharing with reusable polynomials

    • Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter Wild
    Pages 183-193
  11. A message authentication code based on latin squares

    • S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk
    Pages 194-203
  12. Characterization of (k, n) multi-receiver authentication

    • Kaoru Kurosawa, Satoshi Obana
    Pages 204-215

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access