>> Amazon.co.jp
このページのQRコード

Cryptography: Policy and Algorithms : International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings. 1st ed. 1996

種類:
電子ブック
責任表示:
edited by Edward Pyle Dawson, Jovan Golic
出版情報:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1996
著者名:
シリーズ名:
Lecture Notes in Computer Science ; 1029
ISBN:
9783540493631 [3540493638]  CiNii Books  Calil
注記:
Open forum — Cryptography: Personal freedom and law enforcement is it possible to get agreement? -- Privacy and security policy choices in an NII environment -- Commercial Key Escrow: An Australian perspective -- Encryption and the Global Information Infrastructure: An Australian perspective -- Crypto in Europe — markets, law and policy -- Saving dollars makes sense of crypto export controls -- A proposed architecture for trusted third party services -- A new key escrow cryptosystem -- How to fairly reconstruct a shared secret -- A note on nonuniform decimation of periodic sequences -- Randomness measures related to subset occurrence -- Low order approximation of cipher functions -- Multiple encryption with minimum key -- A one-key cryptosystem based on a finite nonlinear automaton -- A cryptanalysis of clock-controlled shift registers with multiple steps -- Discrete optimisation and fast correlation attacks -- Keyed hash functions -- Some active attacks on fast server-aided secret computation protocols for m
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
ローカル注記:
学内専用E-BOOKS (local access only)
オンライン
所蔵情報
Loading availability information
子書誌情報
Loading
タイトルが類似している資料

類似資料:

1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
10
 
11
 
12
 

Dawson, Ed, Golić, Jovan, SpringerLink (Online service)

Springer-Verlag

Pieprzyk, Josef., Safavi-Naini, Reihanah., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Cryptography: Policy and Algorithms Conference, Dawson, Ed (Edward), Golić, Jovan

Springer

Imai, Hideki., Rivest, Ronald L., Matsumoto, Tsutomu., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Seberry, Jennifer., Zheng, Yuliang., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Pieprzyk, Josef., Seberry, Jennifer., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Damgard, Ivan B., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Thampi, Sabu M., Zomaya, Albert Y., Strufe, Thorsten., Alcaraz-Calero, Jose M., Thomas, Tony., SpringerLink (Online …

Springer Berlin Heidelberg : Imprint: Springer

Cohen, Gerard., Giusti, Marc., Mora, Teo., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Boyd, Colin., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Guillou, Louis C., Quisquater, Jean-Jacques., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer

Brickell, Ernest F., SpringerLink (Online service)

Springer Berlin Heidelberg : Imprint: Springer