default search action
6. ACISP 2001: Syndey, NSW, Australia
- Vijay Varadharajan, Yi Mu:
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings. Lecture Notes in Computer Science 2119, Springer 2001, ISBN 3-540-42300-1 - Yacov Yacobi:
A Few Thoughts on E-Commerce. 1-2 - Karl Brincat, Chris J. Mitchell:
New CBC-MAC Forgery Attacks. 3-14 - Amr M. Youssef, Guang Gong:
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. 15-20 - Erik Zenner, Matthias Krause, Stefan Lucks:
Improved Cryptanalysis of the Self-Shrinking Generator. 21-35 - Chris Pavlovski, Colin Boyd:
Attacks Based on Small Factors in Various Group Structures. 36-50 - Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo:
On Classifying Conference Key Distribution Protocols. 51-59 - Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyun Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. 60-73 - Hwankoo Kim, Sang-Jae Moon:
New Public-Key Cryptosystem Using Divisor Class Groups. 74-83 - Andreas Meyer, Stefan Neis, Thomas Pfahler:
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields. 84-103 - Sung-Ming Yen:
Practical Key Recovery Schemes. 104-114 - David May, Henk L. Muller, Nigel P. Smart:
Non-deterministic Processors. 115-129 - Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves:
Personal Secure Booting. 130-144 - Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe:
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. 145-158 - Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan:
A Strategy for MLS Workflow. 159-175 - B. Clifford Neuman:
Condition-Driven Integration of Security Services. 176 - Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. 177-189 - Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu:
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. 190-205 - Akihiro Yamamura, Taiichi Saito:
Private Information Retrieval Based on the Subgroup Membership Problem. 206-220 - Kazumasa Omote, Atsuko Miyaji:
A Practical English Auction with One-Time Registration. 221-234 - Shoichi Hirose, Susumu Yoshida:
A User Authentication Scheme with Identity and Location Privacy. 235-246 - Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee:
An End-to-End Authentication Protocol in Wireless Application Protocol. 247-259 - Akihiro Yamamura, Hirokazu Ishizuka:
Error Detection and Authentication in Quantum Key Distribution. 260-273 - Chuchang Liu, Maris A. Ozols, Anthony Cant:
An Axiomatic Basis for Reasoning about Trust in PKIs. 274-291 - Along Lin:
A Knowledge-Based Approach to Internet Authorizations. 292-304 - John Yesberg, Marie Henderson:
Applications of Trusted Review to Information Security. 305-319 - Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee:
Network Security Modeling and Cyber Attack Simulation Methodology. 320-333 - DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. 334-343 - Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. 344-359 - Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson:
Improving the Availability of Time-Stamping Services. 360-375 - Brian King:
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. 376-391 - Hossein Ghodosi, Josef Pieprzyk:
Democratic Systems. 392-402 - Ayako Maeda, Atsuko Miyaji, Mitsuru Tada:
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. 403-416 - Douglas R. Stinson, Reto Strobl:
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. 417-434 - Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes. 435-444 - Chik How Tan, Xun Yi, Chee Kheong Siew:
Signature Schemes Based on 3rd Order Shift Registers. 445-459 - Toru Nakanishi, Yuji Sugiyama:
Anonymous Statistical Survey of Attributes. 460-473 - Byoungcheon Lee, Heesun Kim, Kwangjo Kim:
Secure Mobile Agent Using Strong Non-designated Proxy Signature. 474 - Colin Boyd, Paul Montague, Khanh Quoc Nguyen:
Elliptic Curve Based Password Authenticated Key Exchange Protocols. 487-501 - André Weimerskirch, Christof Paar, Sheueling Chang Shantz:
Elliptic Curve Cryptography on a Palm OS Device. 502-513 - Kyungah Shim:
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. 514-520
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.