


default search action
4. ACISP 1999: Wollongong, NSW, Australia
- Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry:

Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings. Lecture Notes in Computer Science 1587, Springer 1999, ISBN 3-540-65756-8
Boolean Functions
- William Millan, Andrew J. Clark, Ed Dawson:

Boolean Function Design Using Hill Climbing Methods. 1-11 - Subhamoy Maitra, Palash Sarkar:

Enumeration of Correlation Immune Boolean Functions. 12-25 - Chengxin Qu, Jennifer Seberry, Josef Pieprzyk

:
On the Symmetric Property of Homogeneous Boolean Functions. 26-35
Key Management
- Kapali Viswanathan, Colin Boyd, Ed Dawson:

Publicly Verifiable Key Escrow with Limited Time Span. 36-50 - Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho:

Accelerating Key Establishment Protocols for Mobile Communication. 51-63 - Chih-Hung Li, Josef Pieprzyk

:
Conference Key Agreement from Secret Sharing. 64-76
Cryptanalysis
- Wai W. Fung, James W. Gray III:

On m-Permutation Protection Scheme Against Modification Attack. 77-87 - Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:

Inversion Attack and Branching. 88-102
Signatures
- Willy Susilo

, Reihaneh Safavi-Naini, Josef Pieprzyk
:
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. 103-116 - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:

Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. 117-128 - Hossein Ghodosi, Josef Pieprzyk

:
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. 129-134
RSA Cryptosystems
- Siguna Müller:

On the Security of an RSA Based Encryption Scheme. 135-148 - Marc Gysin, Jennifer Seberry:

Generalised Cycling Attacks on RSA and Strong RSA Primes. 149-163 - Alexander Tiountchik, Elena Trichina:

RSA Acceleration with Field Programmable Gate Arrays. 164-176
Group Cryptography
- Keith M. Martin, Josef Pieprzyk

, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. 177-191 - Shahrokh Saeednia, Hossein Ghodosi:

A Self-Certified Group-Oriented Cryptosystem Without a Combiner. 192-201
Network Security
- Jeffrey Horton, Jennifer Seberry:

Companion Viruses and the Macintosh: Threats and Countermeasures. 202-212 - Paul Ashley

, Bradley Broom, Mark Vandenwauver:
An Implementation of a Secure Version of NFS Including RBAC. 213-227
Electronic Commerce
- Jacques Traoré:

Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. 228-243 - Colin Boyd, Ernest Foo

, Chris Pavlovski:
Efficient Electronic Cash Using Batch Signatures. 244-257 - Jianying Zhou, Robert H. Deng

, Feng Bao:
Evolution of Fair Non-repudiation with TTP. 258-269
Access Contol
- Yun Bai, Vijay Varadharajan:

Authorization in Object Oriented Databases. 270-280 - Gregory Saunders, Michael Hitchens

, Vijay Varadharajan:
An Analysis of Access Control Models. 281-293
Odds and Ends
- Arjen K. Lenstra:

Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. 294-302 - Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini:

Characterization of Optimal Authentication Codes with Arbitration. 303-313 - Akihiro Yamamura

:
A Functional Cryptosystem Using a Group Action. 314-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














