Skip to main content
  • Conference proceedings
  • © 2000

Information Security and Privacy

5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1841)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

  2. Network Security I

    1. Towards a New Authorisation Paradigm for Extranets

      • Richard Au, Mark Looi, Paul Ashley
      Pages 18-29
    2. Custom Safety Policies in Safe Erlang

      • Lawrie Brown
      Pages 30-40
  3. Public Key Cryptography

    1. A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring

      • Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jongin Lim, Okyeon Yi, Maenghee Sung
      Pages 41-48
  4. Network Security II

    1. High Performance Agile Crypto Modules

      • Chandana G. Gamage, Jussipekka Leiwo, Yuliang Zheng
      Pages 74-88
    2. A Three-Party HTTP Proxy to Support Internet Content Regulation

      • Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
      Pages 89-96
  5. Cryptographic Implementation Issues

    1. Cryptanalysis of the m – Permutation Protection Schemes

      • Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
      Pages 97-111
    2. An Implementation of Bitsliced DES on the Pentium MMXTM Processor

      • Lauren May, Lyta Penna, Andrew Clark
      Pages 112-122
  6. Electronic Commerce I

    1. Securing Large E-Commerce Networks

      • Panagiotis Sklavos, Aggelos Varvitsiotis, Despina Polemi
      Pages 123-133
    2. Passive Entities: A Strategy for Electronic Payment Design

      • Ernest Foo, Colin Boyd
      Pages 134-148
  7. Key Recovery

    1. Key Recovery System for the Commercial Environment

      • Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 149-162
  8. Public Key Infrastructure

    1. Key Management for Secure Multicast with Dynamic Controller

      • Hartono Kurnio, Rei Safavi-Naini, Willy Susilo, Huaxiong Wang
      Pages 178-190
    2. PKI Seeks a Trusting Relationship

      • Audun Jøsang, Ingar Glenn Pedersen, Dean Povey
      Pages 191-205
    3. The PKI Specification Dilemma: A Formal Solution

      • Maris A. Ozols, Marie Henderson, Chuchang Liu, Tony Cant
      Pages 206-219
  9. Boolean Functions

    1. Security Weaknesses in a Randomized Stream Cipher

      • Niels Ferguson, Bruce Schneier, David Wagner
      Pages 234-241

Editors and Affiliations

  • Information Security Research Centre, Queensland University of Technology, Brisbane, Australia

    E. P. Dawson, A. Clark, Colin Boyd

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access