


default search action
2. ACISP 1997: Syndey, NSW, Australia
- Vijay Varadharajan, Josef Pieprzyk, Yi Mu:

Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1270, Springer 1997, ISBN 3-540-63232-8
Keynote Lecture
- Fred Piper:

Trusted Third Parties for Secure Electronic Commerce - Are They Needed? 1
1. Security Models And Access Control
- Audun Jøsang

:
Prospectives for Modelling Trust in Information Security. 2-13 - Yun Bai, Vijay Varadharajan:

Analysis and Implementation of a Formal Authorisation Policy Design Approach. 14-25 - Jonathon Tidswell, John Potter:

An Approach to Dynamic Domain and Type Enforcement. 26-37 - Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa

:
Purpose-Oriented Access Control Model in Object-Based Systems. 38-49 - Masato Terada, Yuko Murayama:

User Access Domain Management Systems - ADAMS. 50-61
2. Network Security
- Aviel D. Rubin, Dan Boneh, Kevin Fu:

Revocation of Unread E-mail in an Untrusted Network. 62-75 - Vijay Varadharajan, Rajan Shankaran

, Michael Hitchens
:
Security Issues in Asynchronous Transfer Mode. 76-89 - Jussipekka Leiwo, Yuliang Zheng

:
A Method to Implement a Denial of Service Protection Base. 90-101
3. Secure Hardware And Implementation Issues
- John Holford, George M. Mohay:

ProtectOS: Operating System and Hardware Support for Small Objects. 102-113 - Marc Fischlin:

Practical Memory Checkers for Stacks, Queues and Deques. 114-125
4. Cryptographic Functions And Ciphers
- Arjen K. Lenstra:

Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields. 127-138 - Xun Yi, Kwok-Yan Lam:

A New Hash Function Based on Block Cipher. 139-146 - Xian-Mo Zhang, Yuliang Zheng

:
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. 147-158 - William Millan, Ed Dawson

:
On the Security of Self-Synchronous Ciphers. 159-170 - Albert Sadowski:

Inefficiency of Variant Characteristics for Substitution-Permutation Networks with Position Permutations. 171-182
5. Authentication Codes And Secret Sharing Schemes
- Liqun Chen

, Dieter Gollmann, Chris J. Mitchell
, Peter R. Wild:
Secret Sharing with Reusable Polynomials. 183-193 - Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk

:
A Message Authentication Code Based on Latin Squares. 194-203 - Kaoru Kurosawa, Satoshi Obana:

Characterisation of (k, n) Multi-receiver Authentication. 204-215
6. Cryptanalysis
- Jen Lim, Colin Boyd, Ed Dawson

:
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. 216-227 - M. Salmasidazeh, Leonie Simpson

, Jovan Dj. Golic, Ed Dawson
:
Fast Correlation Attacks and Multiple Linear Approximations. 228-239
7. Key Escrow
- Wenbo Mao:

Verifiable Escrowed Signature. 240-248 - Chor Wah Man, Reihaneh Safavi-Naini:

Democratic Key Escrow Scheme. 249-260 - Feng Bao, Robert H. Deng

, Yongfei Han, Albert B. Jeng:
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. 261-270
8. Security Protocols And Key Management
- Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai:

Protection of Data and Delegated Keys in Digital Distribution. 271-282 - Yi Mu, Vijay Varadharajan, Yan-Xia Lin

:
New Micropayment Schemes Based on PayWords. 283-293 - Colin Boyd:

On Key Agreement and Conference Key Agreement. 294-302 - Shahrokh Saeednia:

Identity-Based and Self-Certified Key-Exchange Protocols. 303-313
9. Applications
- Jana Dittmann, Arnd Steinmetz:

Enabling Technology for the Trading of MPEG-encoded Video. 314-324 - Takehito Abe, Hiroshi Fujii, Kazuhiko Kushima:

Image Distribution Method with Embedded Identifier Scheme for Copyright Protection. 325-336

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














