{"entities":{"Q2574753":{"pageid":2585496,"ns":120,"title":"Item:Q2574753","lastrevid":44384820,"modified":"2025-11-22T13:18:30Z","type":"item","id":"Q2574753","labels":{"en":{"language":"en","value":"Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4--6, 2005. Proceedings."}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 2234781"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2574753$917820D7-59D8-4BE8-B972-3B3A7CF0DF9F","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"9b17532b1ba3848f0bb3626d18ecec6f9237ff59","datavalue":{"value":{"text":"Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4--6, 2005. Proceedings.","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2574753$41BDFCF0-B40D-4F72-8938-A1B38E839BC5","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"df38fd6200b8a28fe0805ed9f21ce627d67136ee","datavalue":{"value":"1076.94001","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$F70E2164-4978-4FEA-A989-324E9B5F84F0","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2574753$7DBA2179-90E1-4EC3-B3E7-C3E4942D403D","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"5cf0995e57103f17985607cb6f7b3cba7b12f2be","datavalue":{"value":{"time":"+2005-12-02T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2574753$6260BD6E-97FA-45D2-A225-6A67F3AE9DE9","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"c5394e2949195e371cdff00c36e3c04b11045a4d","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1053.94002).  Indexed articles:  \\textit{Blakley, Bob; Blakley, G. R.}, All sail, no anchor. III: Risk aggregation and time's arrow, 1-16 [Zbl 1127.68484]  \\textit{Tschofenig, Hannes; Gurtov, Andrei; Ylitalo, Jukka; Nagarajan, Aarthi; Shanmugam, Murugaraj}, Traversing middleboxes with the host identity protocol, 17-28 [Zbl 1127.68398]  \\textit{Pudney, Phillip; Slay, Jill}, An investigation of unauthorised use of wireless networks in Adelaide, South Australia, 29-39 [Zbl 1127.68395]  \\textit{Goyal, Vipul; Tripathy, Rohit}, An efficient solution to the ARP cache poisoning problem, 40-51 [Zbl 1127.68379]  \\textit{Contini, Scott; Shparlinski, Igor E.}, On Stern's attack against secret truncated linear congruential generators, 52-60 [Zbl 1127.94342]  \\textit{Miyaji, Atsuko; Takano, Yuuki}, On the success probability of \\(\\chi^{2}\\)-attack on RC6, 61-74 [Zbl 1127.68392]  \\textit{Paul, Souradyuti; Preneel, Bart}, Solving systems of differential equations of addition (extended abstract), 75-88 [Zbl 1127.94354]  \\textit{Asano, Tomoyuki; Kamio, Kazuya}, A tree based one-key broadcast encryption scheme with low computational overhead, 89-100 [Zbl 1127.94337]  \\textit{Dutta, Ratna; Barua, Rana}, Dynamic group key agreement in tree-based setting (extended abstract), 101-112 [Zbl 1127.94365]  \\textit{Wong, C. K.; Chan, Agnes}, Immediate data authentication for multicast in resource constrained network, 113-121 [Zbl 1127.94377]  \\textit{Doche, Christophe}, Redundant trinomials for finite fields of characteristic 2, 122-133 [Zbl 1127.94344]  \\textit{Kwon, Soonhak}, Efficient Tate pairing computation for elliptic curves over binary fields, 134-145 [Zbl 1127.94348]  \\textit{Kitamura, Izuru; Katagi, Masanobu; Takagi, Tsuyoshi}, A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two, 146-157 [Zbl 1127.94347]  \\textit{Yao, Min; Peng, Kun; Dawson, Ed}, Using ``Fair forfeit'' to prevent truncation attacks on mobile agents, 158-169 [Zbl 1127.68401]  \\textit{Giansiracusa, Michelangelo; Russell, Selwyn; Clark, Andrew; Hynd, John}, An improved execution integrity solution for mobile agents, 170-183 [Zbl 1127.68378]  \\textit{Rieback, Melanie R.; Crispo, Bruno; Tanenbaum, Andrew S.}, RFID guardian: a battery-powered mobile device for RFID privacy management, 184-194 [Zbl 1127.68396]  \\textit{Lv, Jiqiang; Han, Yongfei}, Enhanced DES implementation secure against high-order differential power analysis in smartcards, 195-206 [Zbl 1127.68388]  \\textit{Bevan, R\u00e9gis}, Improved zero value attack on XTR, 207-217 [Zbl 1127.94339]  \\textit{Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille}, Efficient representations on Koblitz curves with resistance to side channel attacks, 218-229 [Zbl 1127.94353]  \\textit{McComb, Tim; Wildman, Luke}, SIFA: a tool for evaluation of high-grade security devices, 230-241 [Zbl 1127.68390]  \\textit{Ang, Russell; Safavi-Naini, Rei; McAven, Luke}, Cancelable key-based fingerprint templates, 242-252 [Zbl 1127.94357]  \\textit{Dent, Alexander W.}, Hybrid signcryption schemes with insider security, 253-266 [Zbl 1127.94363]  \\textit{Lenstra, Arjen; de Weger, Benne}, On the possibility of constructing meaningful hash collisions for public keys, 267-279 [Zbl 1127.94349]  \\textit{Galbraith, Steven D.; Heneghan, Chris; McKee, James F.}, Tunable balancing of RSA, 280-292 [Zbl 1127.94346]  \\textit{Li, Celia; Yang, Cungang; Cheung, Richard}, Key management for role hierarchy in distributed systems, 293-302 [Zbl 1127.94350]  \\textit{Wang, Shujing; Zhang, Yan}, A formalization of distributed authorization with delegation, 303-315 [Zbl 1127.94374]  \\textit{Chow, Sherman S. M.; Hui, Lucas C. K.; Yiu, S. M.; Chow, K. P.}, Two improved partially blind signature schemes from bilinear pairings, 316-328 [Zbl 1127.94362]  \\textit{Susilo, Willy; Mu, Yi}, On the security of nominative signatures, 329-335 [Zbl 1127.94373]  \\textit{McCullagh, Adrian; Caelli, William}, Who goes there? Internet banking: a matter of risk and reward, 336-357 [Zbl 1127.68391]  \\textit{Lui, Richard W. C.; Chow, Sherman S. M.; Hui, Lucas C. K.; Yiu, S. M.}, Role activation management in role based access control, 358-369 [Zbl 1127.68387]  \\textit{Jin, Hai; Qiang, Weizhong; Shi, Xuanhua; Zou, Deqing}, VO-Sec: an access control framework for dynamic virtual organization, 370-381 [Zbl 1127.68382]  \\textit{King, Brian}, An efficient implementation of a threshold RSA signature scheme, 382-393 [Zbl 1127.94369]  \\textit{Steketee, Chris; Brown, Jaimee; Gonz\u00e1lez Nieto, Juan M.; Montague, Paul}, GBD threshold cryptography with an application to RSA key recovery, 394-405 [Zbl 1127.94355]  \\textit{Isshiki, Toshiyuki; Tanaka, Keisuke}, An \\((n-t)\\)-out-of-\\(n\\) threshold ring signature scheme, 406-416 [Zbl 1127.94368]  \\textit{Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie}, Deposit-case attack against secure roaming, 417-428 [Zbl 1127.94378]  \\textit{Choo, Kim-Kwang Raymond; Hitchcock, Yvonne}, Security requirements for key establishment proof models: revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols, 429-442 [Zbl 1127.94361]  \\textit{Nakanishi, Toru; Kubooka, Fumiaki; Hamada, Naoto; Funabiki, Nobuo}, Group signature schemes with membership revocation for large groups, 443-454 [Zbl 1127.94371]  \\textit{Furukawa, Jun; Imai, Hideki}, An efficient group signature scheme from bilinear maps, 455-467 [Zbl 1127.94366]  \\textit{Wei, Victor K.; Yuen, Tsz Hon; Zhang, Fangguo}, Group signature where group manager, members and open authority are identity-based, 468-480 [Zbl 1127.94376]  \\textit{Aura, Tuomas; Nagarajan, Aarthi; Gurtov, Andrei}, Analysis of the HIP base exchange protocol, 481-493 [Zbl 1127.68373]  \\textit{Choi, Kyu Young; Hwang, Jung Yeon; Lee, Dong Hoon; Seo, In Seog}, ID-based authenticated key agreement for low-power mobile devices, 494-505 [Zbl 1127.94360]  \\textit{Guo, Xingyang; Zhang, Quan; Tang, Chaojing}, On the security of two key-updating signature schemes, 506-517 [Zbl 1127.94367]  \\textit{Yang, Bo-Yin; Chen, Jiun-Ming}, Building secure tame-like multivariate public-key cryptosystems: the new TTS, 518-531 [Zbl 1127.94356]  \\textit{Desmedt, Yvo}, Potential impacts of a growing gap between theory and practice in information security, 532-536 [Zbl 1127.94343]  \\textit{Yang, Yanjiang; Bao, Feng; Deng, Robert H.}, Security analysis and fix of an anonymous credential system, 537-547 [Zbl 1127.94380]  \\textit{Bicakci, Kemal; Crispo, Bruno; Tanenbaum, Andrew S.}, Counting abuses using flexible off-line credentials, 548-559 [Zbl 1127.94359]  \\textit{Mitchell, Chris J.}, Cryptanalysis of two variants of PCBC mode when used for message integrity, 560-571 [Zbl 1127.94352]  \\textit{Millan, William L.}, New cryptographic applications of Boolean function equivalence classes, 572-583 [Zbl 1127.94351]","type":"string"},"datatype":"string"},"type":"statement","id":"Q2574753$5A346DEE-279B-4EA4-9287-F1CEFA7FA6E4","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$BDA9049E-4A13-4FC6-88E5-F8E237C4545D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$575D493F-E93E-41A4-9CCE-2A4098C56E68","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$BC87E095-78DE-4E1F-9C65-D27E509A2BA6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b71b42e4e887bf125b7436fe1334aef39047fb5c","datavalue":{"value":"94A62","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$364D78D7-D028-4E31-895B-6CF256ED6416","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"58bd804a9b32ab16fea71636cf187b83a20de8f7","datavalue":{"value":"68P25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$4274F08D-5C4D-4E7C-8D3B-5D21D4C05482","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$30C00B90-D627-4E06-9A2D-D6BA9228D1A5","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"6dcb80a8aeccd0168bffe20143369498925929db","datavalue":{"value":"2234781","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$0BA38478-AE55-4BEB-980C-8904651B0E39","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2574753$8CDA6E04-502E-49AC-8C32-E145D8961F28","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"41ab16b78264607cc4d3e79be44114c687a5719a","datavalue":{"value":"https://doi.org/10.1007/b137750","type":"string"},"datatype":"url"},"type":"statement","id":"Q2574753$EDE218CD-0258-4DEE-8506-F629F689E00A","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"977fc832cc18da87a5c78a540a95ea15bda0f729","datavalue":{"value":"W4299378192","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$B94037B2-9716-4804-AF18-C323CF5D5CF2","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"85129e952a99278c2806e39414c39f4980c83277","datavalue":{"value":"10.1007/B137750","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2574753$E1CD3763-4FA3-430F-91F5-9D3984716712","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:2574753","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:2574753"}}}}}