


default search action
3. ACISP 1998: Brisbane, Queensland, Australia
- Colin Boyd, Ed Dawson:

Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings. Lecture Notes in Computer Science 1438, Springer 1998, ISBN 3-540-64732-5
Invited Speakers
- Per Kaijser:

A Review of the SESAME Development. 1-8 - Siguna Müller, Winfried B. Müller:

The Security of Public Key Cryptosystems Based on Integer Factorization. 9-23
Network Security I
- Paul Ashley

, Mark Vandenwauver, Bradley Broom:
A Uniform Approach to Securing Unix Applications Using SESAME. 24-35 - Rainer Falk, Markus Trommer:

Integrated Management of Network and Host Based Security Mechanisms. 36-47 - Jeffrey Horton, Jennifer Seberry:

Covert Distributed Computing Using Java Through Web Spoofing. 48-57
Block Ciphers
- Xun Yi, Kwok-Yan Lam, Yongfei Han:

Differential Cryptanalysis of a Block Cipher. 58-67 - Hung-Min Sun, Shiuh-Pyng Shieh:

On Private-Key Cryptosystems Based on Product Codes. 68-79 - Gary Carter, Ed Dawson, Lauren Nielsen:

Key Schedules of Iterative Block Ciphers. 80-89
Network Security II
- Uri Blumenthal, Nguyen C. Hien, J. H. Rooney:

Low-Cost Secure Server Connection with Limited-Privilege Clients. 90-98 - Qi He, Katia P. Sycara, Zhongmin Su:

A Solution to Open Standard of PKI. 99-110 - Elke Franz, A. Graubner, Anja Jerichow, Andreas Pfitzmann:

Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. 111-122
Stream Ciphers
- Jovan Dj. Golic, Renato Menicocci:

Correlation Attacks on Up/Down Cascades. 123-134 - Gregory G. Rose:

A Stream Cipher Based on Linear Feedback over GF(28). 135-146 - Leonie Simpson

, Jovan Dj. Golic, Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator. 147-158
Authorization Codes and Boolean Functions
- Reihaneh Safavi-Naini, Yejing Wang:

Bounds and Constructions for A3-code with Multi-senders. 159-168 - Josef Pieprzyk

, Cheng Xin Qu:
Rotation-Symmetric Functions and Fast Hashing. 169-180 - William Millan:

How to Improve the Nonlinearity of Bijective S-Boxes. 181-192
Software Security and Electronic Commerce
- Rauli Kaksonen, Petri Mähönen:

Object Modeling of Cryptographic Algorithms with UML. 193-204 - Martin Manninger, Robert Schischka:

Adapting an Electronic Purse for Internet Payments. 205-214 - Goichiro Hanaoka, Yuliang Zheng

, Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol. 215-226
Public Key Cryptography
- Marie Henderson:

Applications of Linearised and Sub-linearised Polynomials to Information Security. 227-237 - Mark Chen, Eric Hughes:

Protocol Failures Related to Order of Encryption and Signature. 238-249
Hardware
- Wai W. Fung, James W. Gray III:

Protection Against EEPROM Modification Attacks. 250-260 - Jaroslav Hruby:

Trends in Quantum Cryptography in Czech Republic. 261-272
Access Control
- Yun Bai, Vijay Varadharajan:

A High Level Language for Conventional Access Control Models. 273-283 - Tuomas Aura:

Fast Access Control Decisions from Delegation Certificate Databases. 284-295 - Thomas Riechmann, Jürgen Kleinöder:

Meta Objects for Access Control: Role-Based Principals. 296-307 - Jonathon Tidswell, John Potter:

A Dynamically Typed Access Control Model. 308-319
Protocols
- Shahrokh Saeednia, Reihaneh Safavi-Naini:

Efficient Identity-Based Conference Key Distribution Protocols. 320-331 - Carsten Rudolph:

A Formal Model for Systematic Design of Key Establishment Protocols. 332-343 - Colin Boyd, Anish Mathuria:

Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. 344-355 - Tage Stabell-Kulø, Arne Helme, Gianluca Dini:

Detecting Key-Dependencies. 356-366
Secret Sharing
- Hossein Ghodosi, Josef Pieprzyk

, Reihaneh Safavi-Naini:
Secret Sharing in Multilevel and Compartmented Groups. 367-378 - Hossein Ghodosi, Josef Pieprzyk

, Reihaneh Safavi-Naini, Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes. 379-390 - Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa:

A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. 391-402
Digital Signatures
- Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo:

A User Identification System Using Signature Written with Mouse. 403-414 - Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang:

On Zhang's Nonrepudiable Proxy Signature Schemes. 415-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














