ACISP2001, theSixthAustralasianConferenceonInformationSecurityandP- vacy, washeldinSydney, Australia. TheconferencewassponsoredbyInfor- tionandNetworkedSystemSecurityResearch(INSSR), MacquarieUniversity, theAustralianComputerSociety, andtheUniversityofWesternSydney. Iam gratefultoalltheseorganizationsfortheirsupportoftheconference. Theaimofthisconferencewastodrawtogetherresearchers, designers, and usersofinformationsecuritysystemsandtechnologies. Theconferenceprogram ...
Read More
ACISP2001, theSixthAustralasianConferenceonInformationSecurityandP- vacy, washeldinSydney, Australia. TheconferencewassponsoredbyInfor- tionandNetworkedSystemSecurityResearch(INSSR), MacquarieUniversity, theAustralianComputerSociety, andtheUniversityofWesternSydney. Iam gratefultoalltheseorganizationsfortheirsupportoftheconference. Theaimofthisconferencewastodrawtogetherresearchers, designers, and usersofinformationsecuritysystemsandtechnologies. Theconferenceprogram addressedarangeofaspectsfromsystemandnetworksecuritytosecureInternet applicationstocryptographyandcryptanalysis. Thisyeartheprogramcomm- teeinvitedtwointernationalkeynotespeakersDr. YacovYacobifromMicrosoft Research (USA) and Dr. Cli?ord Neumann from the University of Southern California(USA). Dr. Yacobi'stalkaddressedtheissuesoftrust, privacy, and anti-piracyinelectroniccommerce. Dr. Neumann'saddresswasconcernedwith authorizationpolicyissuesandtheirenforcementinapplications. Theconferencereceived91papersfromAmerica, Asia, Australia, and- rope. The program committee accepted 38 papers and these were presented insome9sessionscoveringsystemsecurity, networksecurity, trustandaccess control, Authentication, cryptography, cryptanalysis, DigitalSignatures, Elliptic CurveBasedTechniques, andSecretSharingandThresholdSchemes. Thisyear theacceptedpaperscamefromarangeofcountries, including7fromAustralia, 8fromKorea,7fromJapan,3fromUK,3fromGermany,3fromUSA,2from Singapore,2fromCanadaand1fromBelgium, Estonia, andTaiwan. Organizingaconferencesuchasthisoneisatime-consumingtaskandIwould liketothankallthepeoplewhoworkedhardtomakethisconferenceasuccess. Inparticular, IwouldliketothankProgramCo-chairYiMuforhistirelesswork andthemembersoftheprogramcommitteeforputtingtogetheranexcellent program, andallthesessionchairsandspeakersfortheirtimeande?ort. Special thanks to Yi Mu, Laura Olsen, Rajan Shankaran, and Michael Hitchens for theirhelpwithlocalorganizationdetails. Finally, Iwouldliketothankallthe authorswhosubmittedpapersandalltheparticipantsofACISP2001. Ihope thattheprofessionalcontactsmadeatthisconference, thepresentations, and theproceedingshaveo?eredyouinsightsandideasthatyoucanapplytoyour owne?ortsinsecurityandprivacy. July2001 VijayVaradharajan AUSTRALASIANCONFERENCEON INFORMATIONSECURITYANDPRIVACY ACISP2001 Sponsoredby MacquarieUniversity AustralianComputerSociety General Chair: VijayVaradharajan MacquarieUniversity, Australia Program Chairs: VijayVaradharajan MacquarieUniversity, Australia YiMu MacquarieUniversity, Australia Program Committee: RossAnderson CambridgeUniversity, UK ColinBoyd QueenslandUniversityofTechnology, Australia EdDawson QueenslandUniversityofTechnology, Australia YvoDesmedt FloridaStateUniversity, USA PaulEngland Microsoft YairFrankel ColumbiaUniversity, USA AjoyGhosh UNISYS, Australia DieterGollman Microsoft JohnGordon ConceptLabs, UK KwangjoKim ICU, Korea ChuchangLiu DSTO, Australia MasahiroMambo TohokuUniversity, Japan WenboMao Hewlett-PackardLab., UK ChrisMitchell LondonUniversity, UK EijiOkamoto UniversityofWisconsin, USA JoePato Hewlett-PackardLab., USA JosefPieprzyk MacquarieUniversity, Australia BartPreneel KatholiekeUniversity, Belgium SteveRoberts WithamPtyLtd, Australia QingSihan AcademyofScience, China ReiSafavi-Naini UniversityofWollongong, Australia JenniferSeberry UniversityofWollongong, Australia YuliangZheng MonashUniversity, Australia TableofContents AFewThoughtsonE-Commerce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 YacovYacobi NewCBC-MACForgeryAttacks. . . . . . . . . . . . . . . . . . . . . . . . .
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
520 pp., softcover, library markings, else very good. -If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Trade paperback (US). Glued binding. 522 p. Lecture Notes in Computer Science, 2119. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
New. Trade paperback (US). Glued binding. 522 p. Lecture Notes in Computer Science, 2119. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Trade paperback (US). Glued binding. 522 p. Lecture Notes in Computer Science, 2119. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.