


default search action
6. ACISP 2001: Syndey, NSW, Australia
- Vijay Varadharajan, Yi Mu:

Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings. Lecture Notes in Computer Science 2119, Springer 2001, ISBN 3-540-42300-1 - Yacov Yacobi:

A Few Thoughts on E-Commerce. 1-2 - Karl Brincat, Chris J. Mitchell

:
New CBC-MAC Forgery Attacks. 3-14 - Amr M. Youssef, Guang Gong:

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. 15-20 - Erik Zenner, Matthias Krause, Stefan Lucks:

Improved Cryptanalysis of the Self-Shrinking Generator. 21-35 - Chris Pavlovski

, Colin Boyd:
Attacks Based on Small Factors in Various Group Structures. 36-50 - Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo

:
On Classifying Conference Key Distribution Protocols. 51-59 - Ju-Sung Kang, Okyeon Yi, Dowon Hong

, Hyun Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. 60-73 - Hwankoo Kim

, Sang-Jae Moon:
New Public-Key Cryptosystem Using Divisor Class Groups. 74-83 - Andreas Meyer, Stefan Neis, Thomas Pfahler:

First Implementation of Cryptographic Protocols Based on Algebraic Number Fields. 84-103 - Sung-Ming Yen:

Practical Key Recovery Schemes. 104-114 - David May, Henk L. Muller, Nigel P. Smart:

Non-deterministic Processors. 115-129 - Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves:

Personal Secure Booting. 130-144 - Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe:

Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. 145-158 - Vlad Ingar Wietrzyk, Makoto Takizawa

, Vijay Varadharajan:
A Strategy for MLS Workflow. 159-175 - B. Clifford Neuman:

Condition-Driven Integration of Security Services. 176 - Eun-Sun Cho

, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. 177-189 - Feng Bao, Robert H. Deng

, Peirong Feng, Yan Guo, Hongjun Wu
:
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. 190-205 - Akihiro Yamamura

, Taiichi Saito:
Private Information Retrieval Based on the Subgroup Membership Problem. 206-220 - Kazumasa Omote, Atsuko Miyaji

:
A Practical English Auction with One-Time Registration. 221-234 - Shoichi Hirose, Susumu Yoshida:

A User Authentication Scheme with Identity and Location Privacy. 235-246 - Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee:

An End-to-End Authentication Protocol in Wireless Application Protocol. 247-259 - Akihiro Yamamura

, Hirokazu Ishizuka:
Error Detection and Authentication in Quantum Key Distribution. 260-273 - Chuchang Liu, Maris A. Ozols, Anthony Cant:

An Axiomatic Basis for Reasoning about Trust in PKIs. 274-291 - Along Lin:

A Knowledge-Based Approach to Internet Authorizations. 292-304 - John Yesberg, Marie Henderson:

Applications of Trusted Review to Information Security. 305-319 - Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee:

Network Security Modeling and Cyber Attack Simulation Methodology. 320-333 - DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson

:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. 334-343 - Oliver Jung, Sven Kuhn, Christoph Ruland

, Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. 344-359 - Arne Ansper, Ahto Buldas

, Märt Saarepera, Jan Willemson:
Improving the Availability of Time-Stamping Services. 360-375 - Brian King:

Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. 376-391 - Hossein Ghodosi, Josef Pieprzyk

:
Democratic Systems. 392-402 - Ayako Maeda, Atsuko Miyaji

, Mitsuru Tada:
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. 403-416 - Douglas R. Stinson, Reto Strobl:

Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. 417-434 - Reihaneh Safavi-Naini, Willy Susilo

, Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes. 435-444 - Chik How Tan, Xun Yi, Chee Kheong Siew:

Signature Schemes Based on 3rd Order Shift Registers. 445-459 - Toru Nakanishi, Yuji Sugiyama:

Anonymous Statistical Survey of Attributes. 460-473 - Byoungcheon Lee, Heesun Kim, Kwangjo Kim:

Secure Mobile Agent Using Strong Non-designated Proxy Signature. 474 - Colin Boyd, Paul Montague, Khanh Quoc Nguyen:

Elliptic Curve Based Password Authenticated Key Exchange Protocols. 487-501 - André Weimerskirch, Christof Paar, Sheueling Chang Shantz:

Elliptic Curve Cryptography on a Palm OS Device. 502-513 - Kyungah Shim:

Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. 514-520

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














