Information security and privacy: second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin u.a.
Springer
1997
|
Schriftenreihe: | Lecture notes in computer science
1270 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XI, 336 S. Ill., graph. Darst. |
ISBN: | 3540632328 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV011399249 | ||
003 | DE-604 | ||
005 | 19970730 | ||
007 | t| | ||
008 | 970617s1997 gw ad|| |||| 10||| eng d | ||
016 | 7 | |a 950544191 |2 DE-101 | |
020 | |a 3540632328 |9 3-540-63232-8 | ||
035 | |a (OCoLC)246319457 | ||
035 | |a (DE-599)BVBBV011399249 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-739 |a DE-384 |a DE-29T |a DE-20 |a DE-19 |a DE-521 |a DE-83 |a DE-706 |a DE-188 | ||
050 | 0 | |a QA76.9.A25A279 1997 | |
082 | 0 | |a 005.8 21 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a 28 |2 sdnb | ||
245 | 1 | 0 | |a Information security and privacy |b second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings |c Vijay Varadharajan ... (eds.) |
264 | 1 | |a Berlin u.a. |b Springer |c 1997 | |
300 | |a XI, 336 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1270 | |
650 | 4 | |a Computer security -- Congresses | |
650 | 4 | |a Data protection -- Congresses | |
650 | 4 | |a Privacy, Right of -- Congresses | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 1997 |z Sydney |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Varadharajan, Vijay |e Sonstige |4 oth | |
711 | 2 | |a ACISP |n 2 |d 1997 |c Sydney |j Sonstige |0 (DE-588)2164018-X |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1270 |w (DE-604)BV000000607 |9 1270 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007663544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-007663544 |
Datensatz im Suchindex
_version_ | 1820874853551439872 |
---|---|
adam_text |
CONTENTS
KEYNOTE
LECTURE:
TRUSTED
THIRD
PARTIES
FOR
SECURE
ELECTRONIC
COMMERCE
-
ARE
THEY
NEEDED?
.
1
FRED
PIPER
1.
SECURITY
MODELS
AND
ACCESS
CONTROL
PROSPECTIVES
FOR
MODELLING
TRUST
IN
INFORMATION
SECURITY
.
2
A.
JPSANG
ANALYSIS
AND
IMPLEMENTATION
OF
A
FORMAL
AUTHORISATION
POLICY
DESIGN
APPROACH
.
14
Y.
BAI
AND
V.
VARADHARAJAN
AN
APPROACH
TO
DYNAMIC
DOMAIN
AND
TYPE
ENFORCEMENT
.
26
J.
TIDSWELL
AND
J.
POTTER
PURPOSE-ORIENTED
ACCESS
CONTROL
MODEL
IN
OBJECT-BASED
SYSTEMS
.
38
T.
TACHIKAWA,
H.
HIGAKI,
AND
M.
TAKIZAWA
USER
ACCESS
DOMAIN
MANAGEMENT
SYSTEM
-
ADAMS
.
50
M.
TERADA
AND
Y.
MURAYAMA
2.
NETWORK
SECURITY
REVOCATION
OF
UNREAD
EMAIL
IN
AN
UNTRUSTED
NETWORK
.
62
A.
D.
RUBIN,
D.
BONEH,
AND
K.
FU
SECURITY
ISSUES
IN
ASYNCHRONOUS
TRANSFER
MODE
.
76
R.
SHANKARAN,
V.
VARADHARAJAN,
AND
M.
HITCHENS
A
METHOD
TO
IMPLEMENT
A
DENIAL
OF
SERVICE
PROTECTION
BASE
.
90
J.
LEIWO
AND
Y.
ZHENG
3.
SECURE
HARDWARE
AND
IMPLEMENTATION
ISSUES
PROTECTOS:
OPERATING
SYSTEM
AND
HARDWARE
SUPPORT
FOR
SMALL
OBJECTS
.
102
J.
HOLFORD
AND
G.
MOHAY
PRACTICAL
MEMORY
CHECKERS
FOR
STACKS,
QUEUES
AND
DEQUES
.
114
M.
FISCHLIN
X
PANEL
SESSION:
CRYPTOGRAPHIC
POLICY
GUIDELINES
.
126
SCOTT
CHARNEY
(USA),
STEPHANIE
PERRIN
(CANADA),
STEVE
ORLOWSKI
(AUSTRALIA),
AND
NORMAN
REABURN
(AUSTRALIA),
NIGEL
HICKSON
(UK),
AND
PHILIPPE
DEJEAN
(FRANCE)
4.
CRYPTOGRAPHIC
FUNCTIONS
AND
CIPHERS
USING
CYCLOTOMIC
POLYNOMIALS
TO
CONSTRUCT
EFFICIENT
DISCRETE
LOGARITHM
CRYPTOSYSTEMS
OVER
FINITE
FIELDS
.
127
A.
K.
LENSTRA
A
NEW
HASH
FUNCTION
BASED
ON
BLOCK
CIPHER
.
139
X.
YI
AND
K.-Y.
LAM
NEW
LOWER
BOUNDS
ON
NONLINEARITY
AND
A
CLASS
OF
HIGHLY
NORDINEAR
FUNCTIONS
.
147
X.-M.
ZHANG
AND
Y.
ZHENG
ON
THE
SECURITY
OF
SELF-SYNCHRONOUS
CIPHERS
.
159
W.
MILLAN
AND
E.
DAWSON
INEFFICIENCY
OF
VARIANT
CHARACTERISTICS
FOR
SUBSTITUTION-PERMUTATION
NETWORKS
WITH
POSITION
PERMUTATIONS
.
171
A.
SADOWSKI
5.
AUTHENTICATION
CODES
AND
SECRET
SHARING
SCHEMES
SECRET
SHARING
WITH
REUSABLE
POLYNOMIALS
.
183
L.
CHEN,
D.
GOLLMANN,
C.J.
MITCHELL,
AND
P.
WILD
A
MESSAGE
AUTHENTICATION
CODE
BASED
ON
LATIN
SQUARES
.
194
S.
BAKHTIARI,
R.
SAFAVI-NAINI,
AND
J.
PIEPRZYK
CHARACTERISATION
OF
(K,
N)
MULTI-RECEIVER
AUTHENTICATION
.
204
K.
KUROSAWA
AND
S.
OBANA
6.
CRYPTANALYSIS
CRYPTANALYSIS
OF
ADAPTIVE
ARITHMETIC
CODING
ENCRYPTION
SCHEMES
.
216
J.
LIM,
C.
BOYD,
AND
E.
DAWSON
FAST
CORRELATION
ATTACKS
AND
MULTIPLE
LINEAR
APPROXIMATIONS
.
228
M.
SALMASIZADEH,
L.
SIMPSON,
J.
D.
GOLIC,
AND
E.
DAWSON
7.
KEY
ESCROW
VERIFIABLE
ESCROWED
SIGNATURE
.
240
W.
MAO
XI
DEMOCRATIC
KEY
ESCROW
SCHEME
.
249
C.
W.
MAN
AND
R.
SAFAVI-NAINI
DESIGN
AND
ANALYSES
OF
TWO
BASIC
PROTOCOLS
FOR
USE
IN
TTP-BASED
KEY
ESCROW
.
261
F.
BAO,
R.
DENG,
Y.
HAN,
AND
A.
JENG
8.
SECURITY
PROTOCOLS
AND
KEY
MANAGEMENT
PROTECTION
OF
DATA
AND
DELEGATED
KEYS
IN
DIGITAL
DISTRIBUTION
.
271
M.
MAMBO,
E.
OKAMOTO,
AND
K.
SAKURAI
NEW
MICROPAYMENT
SCHEMES
BASED
ON
PAYWORDS
.
283
Y.
MU,
V.
VARADHARAJAN,
AND
Y.-X.
LIN
ON
KEY
AGREEMENT
AND
CONFERENCE
KEY
AGREEMENT
.
294
C.
BOYD
IDENTITY-BASED
AND
SELF-CERTIFIED
KEY-EXCHANGE
PROTOCOLS
.
303
S.
SAEEDNIA
9.
APPLICATIONS
ENABLING
TECHNOLOGY
FOR
THE
TRADING
OF
MPEG-ENCODED
VIDEO
.
314
J.
DITTMANN
AND
A.
STEINMETZ
IMAGE
DISTRIBUTION
METHOD
WITH
EMBEDDED
IDENTIFIER
SCHEME
FOR
COPYRIGHT
PROTECTION
.
325
T.
ABE,
H.
FUJII,
AND
K.
KUSHIMA
AUTHOR
INDEX
.
337 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV011399249 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25A279 1997 |
callnumber-search | QA76.9.A25A279 1997 |
callnumber-sort | QA 276.9 A25 A279 41997 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 1997 SS 4800 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)246319457 (DE-599)BVBBV011399249 |
dewey-full | 005.821 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 21 |
dewey-search | 005.8 21 |
dewey-sort | 15.8 221 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV011399249</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19970730</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">970617s1997 gw ad|| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">950544191</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540632328</subfield><subfield code="9">3-540-63232-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)246319457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011399249</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25A279 1997</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and privacy</subfield><subfield code="b">second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings</subfield><subfield code="c">Vijay Varadharajan ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">1997</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 336 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1270</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security -- Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection -- Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of -- Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1997</subfield><subfield code="z">Sydney</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Varadharajan, Vijay</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACISP</subfield><subfield code="n">2</subfield><subfield code="d">1997</subfield><subfield code="c">Sydney</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)2164018-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1270</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1270</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007663544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007663544</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 1997 Sydney gnd-content |
genre_facet | Konferenzschrift 1997 Sydney |
id | DE-604.BV011399249 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:06:20Z |
institution | BVB |
institution_GND | (DE-588)2164018-X |
isbn | 3540632328 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007663544 |
oclc_num | 246319457 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-739 DE-384 DE-29T DE-20 DE-19 DE-BY-UBM DE-521 DE-83 DE-706 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-739 DE-384 DE-29T DE-20 DE-19 DE-BY-UBM DE-521 DE-83 DE-706 DE-188 |
physical | XI, 336 S. Ill., graph. Darst. |
publishDate | 1997 |
publishDateSearch | 1997 |
publishDateSort | 1997 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings Vijay Varadharajan ... (eds.) Berlin u.a. Springer 1997 XI, 336 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1270 Computer security -- Congresses Data protection -- Congresses Privacy, Right of -- Congresses Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 1997 Sydney gnd-content Computersicherheit (DE-588)4274324-2 s Kryptologie (DE-588)4033329-2 s DE-604 Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s Varadharajan, Vijay Sonstige oth ACISP 2 1997 Sydney Sonstige (DE-588)2164018-X oth Lecture notes in computer science 1270 (DE-604)BV000000607 1270 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007663544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings Lecture notes in computer science Computer security -- Congresses Data protection -- Congresses Privacy, Right of -- Congresses Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings |
title_auth | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings |
title_exact_search | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings |
title_full | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings Vijay Varadharajan ... (eds.) |
title_fullStr | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings Vijay Varadharajan ... (eds.) |
title_full_unstemmed | Information security and privacy second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings Vijay Varadharajan ... (eds.) |
title_short | Information security and privacy |
title_sort | information security and privacy second australasian conference acisp 97 sydney nsw australia july 7 9 1997 proceedings |
title_sub | second Australasian conference, ACISP '97, Sydney, NSW, Australia, July 7 - 9, 1997 ; proceedings |
topic | Computer security -- Congresses Data protection -- Congresses Privacy, Right of -- Congresses Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security -- Congresses Data protection -- Congresses Privacy, Right of -- Congresses Datenschutz Datensicherung Computersicherheit Kryptologie Konferenzschrift 1997 Sydney |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007663544&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT varadharajanvijay informationsecurityandprivacysecondaustralasianconferenceacisp97sydneynswaustraliajuly791997proceedings AT acispsydney informationsecurityandprivacysecondaustralasianconferenceacisp97sydneynswaustraliajuly791997proceedings |