{"entities":{"Q5943780":{"pageid":8120582,"ns":120,"title":"Item:Q5943780","lastrevid":32435347,"modified":"2024-03-19T22:41:43Z","type":"item","id":"Q5943780","labels":{"en":{"language":"en","value":"Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11--13, 2001. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1648183"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5943780$E1A9213E-DE52-49E3-AC7A-68D6ABEBB35A","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"a067c8bc6dbef2ef8cec4f5b519ba9774b5b3562","datavalue":{"value":{"text":"Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11--13, 2001. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5943780$E61EA7D6-D004-4995-97BE-A9F7E5BE7EED","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"90169298cc5f44dd110a0269155ba0ad59c429ac","datavalue":{"value":"0969.00103","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$B62A342E-8C4E-4A68-A291-375DD1568323","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"96f27c57e2eb51b696edc6ce7d1515e0a0cd6dc1","datavalue":{"value":"10.1007/3-540-47719-5","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$739E21F1-BC40-4FB6-85A8-89DBFB5201C3","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5943780$12A0AAB0-E17E-46D7-805B-64BCFECF295B","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"a12c476678ac830de6d391e0b3f53860587b6e09","datavalue":{"value":{"time":"+2001-09-18T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5943780$2FE92FAC-9A74-4982-A2BA-51A7838000FE","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"b10a3f3e2e36851aaa35168d63e2cc90447bebe4","datavalue":{"value":"The articles of this volume will be reviewed individually. The preceding conference (5th, 2000) has been reviewed (see Zbl 0941.00050).  Indexed articles:  \\textit{Yacobi, Yacov}, A few thoughts on e-commerce. Keynote lecture, 1-2 [Zbl 0994.68543]  \\textit{Brincat, Karl; Mitchell, Chris J.}, New CBC-MAC forgery attacks, 3-14 [Zbl 0994.68558]  \\textit{Youssef, Amr; Gong, Guang}, Cryptanalysis of a public key cryptosystem proposed at ACISP 2000, 15-20 [Zbl 1005.94531]  \\textit{Zenner, Erik; Krause, Matthias; Lucks, Stefan}, Improved cryptanalysis of the self-shrinking generator, 21-35 [Zbl 1005.94533]  \\textit{Pavlovski, Chris; Boyd, Colin}, Attacks based on small factors in various group structures, 36-50 [Zbl 1004.94528]  \\textit{Saeednia, Shahrokh; Safavi-Naini, Rei; Susilo, Willy}, On classifying conference key distribution protocols, 51-59 [Zbl 1006.94530]  \\textit{Kang, Ju-Sung; Yi, Okyeon; Hong, Dowon; Cho, Hyunsook}, Pseudorandomness of MISTY-type transformations and the block cipher KASUMI, 60-73 [Zbl 1007.94538]  \\textit{Kim, Hwankoo; Moon, SangJae}, New public-key cryptosystem using divisor class groups, 74-83 [Zbl 1008.94539]  \\textit{Meyer, Andreas; Neis, Stefan; Pfahler, Thomas}, First implementation of cryptographic protocols based on algebraic number fields, 84-103 [Zbl 1005.94532]  \\textit{Yen, Sung-Ming}, Practical key recovery schemes, 104-114 [Zbl 1004.94533]  \\textit{May, David; Muller, Henk L.; Smart, Nigel P.}, Non-deterministic processors, 115-129 [Zbl 0994.68559]  \\textit{Itoi, Naomaru; Arbaugh, William A.; Pollack, Samuela J.; Reeves, Daniel M.}, Personal secure booting, 130-144 [Zbl 0994.68561]  \\textit{Goto, Hideaki; Mambo, Masahiro; Shizuya, Hiroki; Watanabe, Yasuyoshi}, Evaluation of tamper-resistant software deviating from structured programming rules, 145-158 [Zbl 0994.68565]  \\textit{Wietrzyk, Vlad Ingar; Takizawa, Makoto; Varadharajan, Vijay}, A strategy for MLS workflow, 159-175 [Zbl 0994.68546]  \\textit{Neumann, Clifford}, Condition-driven integration of security services. Keynote lecture, 176 [Zbl 0994.68550]  \\textit{Cho, Eun-Sun; Hong, Sunho; Oh, Sechang; Yeh, Hong-Jin; Hong, Manpyo}, SKETHIC: Secure kernel extension against Trojan horses with information-carrying codes, 177-189 [Zbl 0994.68502]  \\textit{Bao, Feng; Deng, Robert; Feng, Peirong; Guo, Yan; Wu, Hongjun}, Secure and private distribution of online video and some related cryptographic issues, 190-205 [Zbl 0994.68566]  \\textit{Yamamura, Akihiro; Saito, Taiichi}, Private information retrieval based on the subgroup membership problem, 206-220 [Zbl 0994.68501]  \\textit{Omote, Kazumasa; Miyaji, Atsuko}, A practical English auction with one-time registration, 221-234 [Zbl 0994.68545]  \\textit{Hirose, Shouichi; Yoshida, Susumu}, A user authentication scheme with identity and location privacy, 235-246 [Zbl 1006.94539]  \\textit{Yang, Jong-Phil; Shin, Weon; Rhee, Kyung-Hyune}, An end-to-end authentication protocol in wireless application protocol, 247-259 [Zbl 1007.94541]  \\textit{Yamamura, Akihiro; Ishizuka, Hirokazu}, Error detection and authentication in quantum key distribution, 260-273 [Zbl 1008.94547]  \\textit{Liu, Chuchang; Ozols, Maris; Cant, Tony}, An axiomatic basis for reasoning about trust in PKIs, 274-291 [Zbl 1008.94537]  \\textit{Lin, Along}, A knowledge-based approach to Internet authorizations, 292-304 [Zbl 0994.68544]  \\textit{Yesberg, John; Henderson, Marie}, Applications of trusted review to information security, 305-319 [Zbl 0994.68547]  \\textit{Chi, Sung-Do; Park, Jong Sou; Jung, Ki-Chan; Lee, Jang-Se}, Network security modeling and cyber attack simulation methodology, 320-333 [Zbl 0994.68557]  \\textit{Park, DongGook; Kim, JungJoon; Boyd, Colin; Dawson, Ed}, Cryptographic salt: A countermeasure against denial-of-service attacks, 334-343 [Zbl 0994.68551]  \\textit{Jung, Oliver; Kuhn, Sven; Ruland, Christoph; Wollenweber, Kai}, Enhanced modes of operation for the encryption in high-speed networks and their impact on QoS, 344-359 [Zbl 0994.68564]  \\textit{Ansper, Arne; Buldas, Ahto; Saarepera, M\u00e4rt; Willemson, Jan}, Improving the availability of time-stamping services, 360-375 [Zbl 0994.68553]  \\textit{King, Brian}, Randomness required for linear threshold sharing schemes defined over any finite abelian group, 376-391 [Zbl 1007.94543]  \\textit{Ghodosi, Hossein; Pieprzyk, Josef}, Democratic systems, 392-402 [Zbl 1006.94541]  \\textit{Maeda, Ayako; Miyaji, Atsuko; Tada, Mitsuru}, Efficient and unconditionally secure verifiable threshold changeable scheme, 403-416 [Zbl 1005.94536]  \\textit{Stinson, Douglas R.; Strobl, Reto}, Provably secure distributed Schnorr signatures and a \\((t,n)\\) threshold scheme for implicit certificates, 417-434 [Zbl 1005.94538]  \\textit{Safavi-Naini, Rei; Susilo, Willy; Wang, Huaxiong}, How to construct fail-stop confirmer signature schemes, 435-444 [Zbl 1005.94537]  \\textit{Tan, Chik How; Yi, Xun; Siew, Chee Kheong}, Signature schemes based on 3rd order shift registers, 445-459 [Zbl 1004.94544]  \\textit{Nakanishi, Toru; Sugiyama, Yuji}, Anonymous statistical survey of attributes, 460-473 [Zbl 1006.94540]  \\textit{Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo}, Secure mobile agent using strong non-designated proxy signature, 474-486 [Zbl 0994.68562]  \\textit{Boyd, Colin; Montague, Paul; Nguyen, Khanh}, Elliptic curve based password authenticated key exchange protocols, 487-501 [Zbl 1007.94542]  \\textit{Weimerskirch, Andr\u00e9; Paar, Christof; Shantz, Sheueling Chang}, Elliptic curve cryptography on a Palm OS device, 502-513 [Zbl 1008.94538]  \\textit{Shim, Kyungah}, Reducing certain elliptic curve discrete logarithms to logarithms in a finite field, 514-520 [Zbl 1008.94540]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$DC18CA11-C121-416C-8FD3-EA2F5A57D3D4","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$16F05C29-0441-4590-B996-E53B971E8883","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$4C5420C3-22D3-4F40-A40D-F4E6DBF7C453","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$43079003-2A19-4542-882C-4DC302C27A72","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"840446f984617fc3dc06acb8fe7bcf9769cf2963","datavalue":{"value":"1648183","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$EAEA459F-41B9-431B-B7DF-2932481D6F4F","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"6983dc3dbb00fd2cd8b6843aa10b943ad864f576","datavalue":{"value":"Sydney (Australia)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$0E1AE98D-0010-42C7-A4FA-731BEF67E813","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$3F36B152-FFC9-4AEE-B661-A5AD0E30A517","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$0B41B3EC-85EA-43E4-893C-EE6145BA0095","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"11e7f43b7b85ec6a77093a0d31ce832a45ec2416","datavalue":{"value":"ACISP 2001","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$487FCCB3-D565-4222-9B04-CCDFEE7EB190","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"ab1fd1decd934723169d2e802189bcc6fd1bd581","datavalue":{"value":"Australasian conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$99F75D12-B93E-460E-8074-916F05945C46","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"8a631b4c31c28ded5d94827388c4651023fe04e9","datavalue":{"value":"Information security","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$7D127946-117B-482D-AF05-DB2F18BE77E4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"cfb2a4b092aaa70366d1e2276625aac0c6ebab1b","datavalue":{"value":"Privacy","type":"string"},"datatype":"string"},"type":"statement","id":"Q5943780$1CC77A90-4AA9-48E5-A30C-22E5022AB670","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5943780$53EE70DF-FEA0-4DFC-A085-D84FF771F5F2","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"84978499957d84ecb753e539ad5d09cf536335f0","datavalue":{"value":"https://doi.org/10.1007/3-540-47719-5","type":"string"},"datatype":"url"},"type":"statement","id":"Q5943780$E2D53799-8AFA-4F26-A0C7-F449B2DC4B11","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"00454e3b4468ed35b82839efc6a049899b42e092","datavalue":{"value":"W4300557361","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5943780$8A792CFD-9A3B-4151-9E1E-404FA9CBC509","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5943780","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5943780"}}}}}