


default search action
10. ACISP 2005: Brisbane, Australia
- Colin Boyd, Juan Manuel González Nieto:

Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Lecture Notes in Computer Science 3574, Springer 2005, ISBN 3-540-26547-3
Invited Talk
- Bob Blakley, G. R. Blakley:

All Sail, No Anchor III: Risk Aggregation and Time's Arrow. 1-16
Network Security
- Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam:

Traversing Middleboxes with the Host Identity Protocol. 17-28 - Phillip Pudney, Jill Slay:

An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. 29-39 - Vipul Goyal, Rohit Tripathy:

An Efficient Solution to the ARP Cache Poisoning Problem. 40-51
Cryptanalysis
- Scott Contini, Igor E. Shparlinski

:
On Stern's Attack Against Secret Truncated Linear Congruential Generators. 52-60 - Atsuko Miyaji

, Yuuki Takano:
On the Success Probability of chi2-attack on RC6. 61-74 - Souradyuti Paul, Bart Preneel:

Solving Systems of Differential Equations of Addition. 75-88
Group Communications
- Tomoyuki Asano, Kazuya Kamio:

A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. 89-100 - Ratna Dutta, Rana Barua:

Dynamic Group Key Agreement in Tree-Based Setting. 101-112 - C. K. Wong, Agnes Chan:

Immediate Data Authentication for Multicast in Resource Constrained Network. 113-121
Elliptic Curve Cryptography
- Christophe Doche:

Redundant Trinomials for Finite Fields of Characteristic 2. 122-133 - Soonhak Kwon:

Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. 134-145 - Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi:

A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. 146-157
Mobile Security
- Ming Yao, Kun Peng, Ed Dawson:

Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. 158-169 - Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd:

An Improved Execution Integrity Solution for Mobile Agents. 170-183 - Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:

RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. 184-194
Side Channel Attacks
- Jiqiang Lv, Yongfei Han:

Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. 195-206 - Régis Bevan:

Improved Zero Value Attack on XTR. 207-217 - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:

Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. 218-229
Evaluation and Biometrics
- Tim McComb, Luke Wildman

:
SIFA: A Tool for Evaluation of High-Grade Security Devices. 230-241 - Russell Ang, Reihaneh Safavi-Naini, Luke McAven:

Cancelable Key-Based Fingerprint Templates. 242-252
Public Key Cryptosystems
- Alexander W. Dent:

Hybrid Signcryption Schemes with Insider Security. 253-266 - Arjen K. Lenstra, Benne de Weger:

On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. 267-279 - Steven D. Galbraith, Chris Heneghan, James F. McKee:

Tunable Balancing of RSA. 280-292
Access Control I
- Celia Li, Cungang Yang, Richard Cheung:

Key Management for Role Hierarchy in Distributed Systems. 293-302 - Shujing Wang, Yan Zhang:

A Formalization of Distributed Authorization with Delegation. 303-315
Signatures I
- Sherman S. M. Chow

, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. 316-328 - Willy Susilo

, Yi Mu:
On the Security of Nominative Signatures. 329-335
Invited Talk
- Adrian McCullagh, William J. Caelli:

Who Goes There? Internet Banking: A Matter of Risk and Reward. 336-357
Access Control II
- Richard W. C. Lui, Sherman S. M. Chow

, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Role Activation Management in Role Based Access Control. 358-369 - Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:

VO-Sec: An Access Control Framework for Dynamic Virtual Organization. 370-381
Threshold Cryptography
- Brian King:

An Efficient Implementation of a Threshold RSA Signature Scheme. 382-393 - Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague:

GBD Threshold Cryptography with an Application to RSA Key Recovery. 394-405 - Toshiyuki Isshiki, Keisuke Tanaka:

An (n-t)-out-of-n Threshold Ring Signature Scheme. 406-416
Protocols I
- Guomin Yang

, Duncan S. Wong, Xiaotie Deng:
Deposit-Case Attack Against Secure Roaming. 417-428 - Kim-Kwang Raymond Choo, Yvonne Hitchcock:

Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. 429-442
Group Signatures
- Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki:

Group Signature Schemes with Membership Revocation for Large Groups. 443-454 - Jun Furukawa, Hideki Imai:

An Efficient Group Signature Scheme from Bilinear Maps. 455-467 - Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang

:
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. 468-480
Protocols II
- Tuomas Aura, Aarthi Nagarajan, Andrei V. Gurtov:

Analysis of the HIP Base Exchange Protocol. 481-493 - Kyu Young Choi

, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo:
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. 494-505
Signatures II
- Xingyang Guo, Quan Zhang, Chaojing Tang:

On the Security of Two Key-Updating Signature Schemes. 506-517 - Bo-Yin Yang, Jiun-Ming Chen:

Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. 518-531
Invited Talk
- Yvo Desmedt:

Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. 532-536
Credentials
- Yanjiang Yang, Feng Bao, Robert H. Deng

:
Security Analysis and Fix of an Anonymous Credential System. 537-547 - Kemal Bicakci

, Bruno Crispo, Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials. 548-559
Symmetric Cryptography
- Chris J. Mitchell

:
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. 560-571 - William Millan:

New Cryptographic Applications of Boolean Function Equivalence Classes. 572-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














