Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/acisp:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/acisp/AtapoorBCP23, author = {Shahla Atapoor and Karim Baghery and Daniele Cozzo and Robi Pedersen}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {CSI-SharK: CSI-FiSh with Sharing-friendly Keys}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {471--502}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_21}, doi = {10.1007/978-3-031-35486-1\_21}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AtapoorBCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BeightonBSW23, author = {Matthew Beighton and Harry Bartlett and Leonie Simpson and Kenneth Koon{-}Ho Wong}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {89--108}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_5}, doi = {10.1007/978-3-031-35486-1\_5}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BeightonBSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Berti23, author = {Francesco Berti}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Reconsidering Generic Composition: The Modes A10, {A11} and {A12} are Insecure}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {157--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_8}, doi = {10.1007/978-3-031-35486-1\_8}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Berti23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydKM23, author = {Colin Boyd and Bor de Kock and Lise Millerjord}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Modular Design of KEM-Based Authenticated Key Exchange}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {553--579}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_24}, doi = {10.1007/978-3-031-35486-1\_24}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CheT23, author = {Cheng Che and Tian Tian}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {A New Correlation Cube Attack Based on Division Property}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {53--71}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_3}, doi = {10.1007/978-3-031-35486-1\_3}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CheT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Chen0ALJW23, author = {Huiqin Chen and Yongqiang Li and Parhat Abla and Zhiran Li and Lin Jiao and Mingsheng Wang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {431--451}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_19}, doi = {10.1007/978-3-031-35486-1\_19}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Chen0ALJW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FanLA23, author = {Jingjing Fan and Xingye Lu and Man Ho Au}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {320--340}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_15}, doi = {10.1007/978-3-031-35486-1\_15}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FanLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FengLW0L023, author = {Zhuohui Feng and Ye Luo and Chao Wang and Qianqian Yang and Zhiquan Liu and Ling Song}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Improved Differential Cryptanalysis on {SPECK} Using Plaintext Structures}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {3--24}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_1}, doi = {10.1007/978-3-031-35486-1\_1}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FengLW0L023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FooL23, author = {Ernest Foo and Qinyi Li}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {381--402}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_17}, doi = {10.1007/978-3-031-35486-1\_17}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FooL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshibashiY23, author = {Ren Ishibashi and Kazuki Yoneyama}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Compact Password Authenticated Key Exchange from Group Actions}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {220--247}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_11}, doi = {10.1007/978-3-031-35486-1\_11}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshibashiY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshizakaF23, author = {Masahito Ishizaka and Kazuhide Fukushima}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {291--319}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_14}, doi = {10.1007/978-3-031-35486-1\_14}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshizakaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Ismail0HG23, author = {Maliha Ismail and Yan Lin and DongGyun Han and Debin Gao}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {BinAlign: Alignment Padding Based Compiler Provenance Recovery}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {609--629}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_26}, doi = {10.1007/978-3-031-35486-1\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Ismail0HG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IzabachenePR23, author = {Malika Izabach{\`{e}}ne and Lucas Prabel and Adeline Roux{-}Langlois}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Identity-Based Encryption from Lattices Using Approximate Trapdoors}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {270--290}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_13}, doi = {10.1007/978-3-031-35486-1\_13}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IzabachenePR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimuraTT23, author = {Naoto Kimura and Atsushi Takayasu and Tsuyoshi Takagi}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Memory-Efficient Quantum Information Set Decoding Algorithm}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {452--468}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_20}, doi = {10.1007/978-3-031-35486-1\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimuraTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LohGSY23, author = {Jia{-}Chng Loh and Fuchun Guo and Willy Susilo and Guomin Yang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {A Tightly Secure ID-Based Signature Scheme Under {DL} Assumption in {AGM}}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {199--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_10}, doi = {10.1007/978-3-031-35486-1\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LohGSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MadhusudanSTCP23, author = {Akash Madhusudan and Mahdi Sedaghat and Samarth Tiwari and Kelong Cong and Bart Preneel}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {580--605}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_25}, doi = {10.1007/978-3-031-35486-1\_25}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MadhusudanSTCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaoWZ023, author = {Yongxia Mao and Wenling Wu and Yafei Zheng and Lei Zhang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Related-Cipher Attacks: Applications to Ballet and {ANT}}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {109--123}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_6}, doi = {10.1007/978-3-031-35486-1\_6}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaoWZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Mouha23, author = {Nicky Mouha}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Exploring Formal Methods for Cryptographic Hash Function Implementations}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {177--195}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_9}, doi = {10.1007/978-3-031-35486-1\_9}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Mouha23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Mukherjee23, author = {Sayantan Mukherjee}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {523--552}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_23}, doi = {10.1007/978-3-031-35486-1\_23}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Mukherjee23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakahashiSARSL023, author = {Motoki Nakahashi and Rentaro Shiba and Ravi Anand and Mostafizar Rahman and Kosei Sakamoto and Fukang Liu and Takanori Isobe}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {403--430}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_18}, doi = {10.1007/978-3-031-35486-1\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakahashiSARSL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OkonkwoFHLJ23, author = {Zulu Okonkwo and Ernest Foo and Zhe Hou and Qinyi Li and Zahra Jadidi}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Encrypted Network Traffic Classification with Higher Order Graph Neural Network}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {630--650}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_27}, doi = {10.1007/978-3-031-35486-1\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OkonkwoFHLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangNLLPW23, author = {Jinliang Wang and Chao Niu and Qun Liu and Muzhou Li and Bart Preneel and Meiqin Wang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Cryptanalysis of {SPEEDY}}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {124--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_7}, doi = {10.1007/978-3-031-35486-1\_7}, timestamp = {Thu, 22 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangNLLPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XieT23, author = {Xiaofeng Xie and Tian Tian}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {The Triangle Differential Cryptanalysis}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {72--88}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_4}, doi = {10.1007/978-3-031-35486-1\_4}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XieT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuCWW23, author = {Zeyu Xu and Shiyao Chen and Meiqin Wang and Puwen Wei}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly {\textdollar}{\textbackslash}mathbb \{F\}{\_}p{\textdollar}-Based Ciphers}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {25--52}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_2}, doi = {10.1007/978-3-031-35486-1\_2}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuCWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuW23, author = {Peiying Xu and Li{-}Ping Wang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Multi-key Homomorphic Secret Sharing from {LWE} Without Multi-key {HE}}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {248--269}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_12}, doi = {10.1007/978-3-031-35486-1\_12}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuanTA23, author = {Quan Yuan and Mehdi Tibouchi and Masayuki Abe}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Quantum-Access Security of Hash-Based Signature Schemes}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {343--380}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_16}, doi = {10.1007/978-3-031-35486-1\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuanTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuenPHZ23, author = {Tsz Hon Yuen and Shimin Pan and Sheng Huang and Xiaoting Zhang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Practical Verifiable Random Function with {RKA} Security}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {503--522}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_22}, doi = {10.1007/978-3-031-35486-1\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuenPHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2023, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1}, doi = {10.1007/978-3-031-35486-1}, isbn = {978-3-031-35485-4}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AdomnicaiMS22, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Maki Shigeri}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Fast Skinny-128 {SIMD} Implementations for Sequential Modes of Operation}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {125--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_7}, doi = {10.1007/978-3-031-22301-3\_7}, timestamp = {Sat, 17 Dec 2022 21:30:21 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AdomnicaiMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiBJVN22, author = {Shi Bai and Austin Beard and Floyd Johnson and Sulani K. B. Vidhanalage and Tran Ngo}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Fiat-Shamir Signatures Based on Module-NTRU}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {289--308}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_15}, doi = {10.1007/978-3-031-22301-3\_15}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiBJVN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BiLLW22, author = {Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Hybrid Dual and Meet-LWE Attack}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {168--188}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_9}, doi = {10.1007/978-3-031-22301-3\_9}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BiLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BijweCS22, author = {Subodh Bijwe and Amit Kumar Chauhan and Somitra Kumar Sanadhya}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {85--105}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_5}, doi = {10.1007/978-3-031-22301-3\_5}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BijweCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CaoPCL22, author = {Jinzheng Cao and Yanbin Pan and Qingfeng Cheng and Xinghua Li}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Handle the Traces: Revisiting the Attack on {ECDSA} with {EHNP}}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {147--167}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_8}, doi = {10.1007/978-3-031-22301-3\_8}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CaoPCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChangGHM22, author = {Donghoon Chang and Surabhi Garg and Munawar Hasan and Sweta Mishra}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {On Security of Fuzzy Commitment Scheme for Biometric Authentication}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {399--419}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_20}, doi = {10.1007/978-3-031-22301-3\_20}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChangGHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenLLG22, author = {Shenwei Chen and Zhen Liu and Yu Long and Dawu Gu}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {DeChain: {A} Blockchain Framework Enhancing Decentralization via Sharding}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {469--488}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_23}, doi = {10.1007/978-3-031-22301-3\_23}, timestamp = {Wed, 14 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenLLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DingESS22, author = {Xiaohui Ding and Muhammed F. Esgin and Amin Sakzad and Ron Steinfeld}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {332--351}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_17}, doi = {10.1007/978-3-031-22301-3\_17}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DingESS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GjosteenHMRS22, author = {Kristian Gj{\o}steen and Thomas Haines and Johannes M{\"{u}}ller and Peter B. R{\o}nne and Tjerand Silde}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Verifiable Decryption in the Head}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {355--374}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_18}, doi = {10.1007/978-3-031-22301-3\_18}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GjosteenHMRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GrassiR22, author = {Lorenzo Grassi and Christian Rechberger}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round {AES}}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {24--45}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_2}, doi = {10.1007/978-3-031-22301-3\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GrassiR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoF22, author = {Wenshuo Guo and Fangwei Fu}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from {ACISP} 2018}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {189--205}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_10}, doi = {10.1007/978-3-031-22301-3\_10}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuoF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoSW22, author = {Jian Guo and Ling Song and Haoyang Wang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Key Structures: Improved Related-Key Boomerang Attack Against the Full {AES-256}}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {3--23}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_1}, doi = {10.1007/978-3-031-22301-3\_1}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GuoSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiZZ22, author = {Yumei Li and Mingwu Zhang and Futai Zhang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {229--243}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_12}, doi = {10.1007/978-3-031-22301-3\_12}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LoeMOQ22, author = {Angelique Faye Loe and Liam Medley and Christian O'Connell and Elizabeth A. Quaglia}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {{TIDE:} {A} Novel Approach to Constructing Timed-Release Encryption}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {244--264}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_13}, doi = {10.1007/978-3-031-22301-3\_13}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LoeMOQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaedaN22, author = {Yusaku Maeda and Koji Nuida}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {209--228}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_11}, doi = {10.1007/978-3-031-22301-3\_11}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MaedaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaoWWZ22, author = {Yongxia Mao and Wenling Wu and Bolin Wang and Li Zhang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Improved Division Property for Ciphers with Complex Linear Layers}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {106--124}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_6}, doi = {10.1007/978-3-031-22301-3\_6}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaoWWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MirzaeiSYS22, author = {Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Garrison: {A} Novel Watchtower Scheme for Bitcoin}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {489--508}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_24}, doi = {10.1007/978-3-031-22301-3\_24}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MirzaeiSYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MiyashitaIM22, author = {Shotaro Miyashita and Ryoma Ito and Atsuko Miyaji}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {46--66}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_3}, doi = {10.1007/978-3-031-22301-3\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MiyashitaIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanCCY22, author = {Shimin Pan and Kwan Yin Chan and Handong Cui and Tsz Hon Yuen}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Multi-signatures for {ECDSA} and Its Applications in Blockchain}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {265--285}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_14}, doi = {10.1007/978-3-031-22301-3\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhalakarnSH22, author = {Kittiphon Phalakarn and Vorapong Suppakitpaisarn and M. Anwar Hasan}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {309--331}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_16}, doi = {10.1007/978-3-031-22301-3\_16}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PhalakarnSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RaikwarG22, author = {Mayank Raikwar and Danilo Gligoroski}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {SoK: Decentralized Randomness Beacon Protocols}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {420--446}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_21}, doi = {10.1007/978-3-031-22301-3\_21}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/RaikwarG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuWGZHKCL22, author = {Xiaofei Wu and Hao Wang and Chunpeng Ge and Lu Zhou and Qiong Huang and Lanju Kong and Lizhen Cui and Zhe Liu}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {{CCOM:} Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {449--468}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_22}, doi = {10.1007/978-3-031-22301-3\_22}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuWGZHKCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangWXDLWL22, author = {Handong Zhang and Puwen Wei and Haiyang Xue and Yi Deng and Jinsong Li and Wei Wang and Guoxiao Liu}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {375--398}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_19}, doi = {10.1007/978-3-031-22301-3\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangWXDLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangWZ22, author = {Yuhan Zhang and Wenling Wu and Lei Zhang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Improved Differential Attack on Round-Reduced {LEA}}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {67--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_4}, doi = {10.1007/978-3-031-22301-3\_4}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhaoDLLXG22, author = {Chen Zhao and Jianing Ding and Zhenzhen Li and Zhen Li and Gang Xiong and Gaopeng Gou}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {509--528}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_25}, doi = {10.1007/978-3-031-22301-3\_25}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhaoDLLXG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2022, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3}, doi = {10.1007/978-3-031-22301-3}, isbn = {978-3-031-22300-6}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AbdolmalekiS21, author = {Behzad Abdolmaleki and Daniel Slamanig}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {46--67}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_3}, doi = {10.1007/978-3-030-90567-5\_3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbdolmalekiS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BlazyMNPS21, author = {Olivier Blazy and Sayantan Mukherjee and Huyen Nguyen and Duong Hieu Phan and Damien Stehl{\'{e}}}, editor = {Joonsang Baek and Sushmita Ruj}, title = {An Anonymous Trace-and-Revoke Broadcast Encryption Scheme}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {214--233}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_11}, doi = {10.1007/978-3-030-90567-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BlazyMNPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoyenFL21, author = {Xavier Boyen and Ernest Foo and Qinyi Li}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Anonymous Lattice Identity-Based Encryption with Traceable Identities}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {630--649}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_32}, doi = {10.1007/978-3-030-90567-5\_32}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoyenFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrunettaTLBM21, author = {Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {510--528}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_26}, doi = {10.1007/978-3-030-90567-5\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrunettaTLBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenDCRLLS21, author = {Jikun Chen and Ruoyu Deng and Hongbin Chen and Na Ruan and Yao Liu and Chao Liu and Chunhua Su}, editor = {Joonsang Baek and Sushmita Ruj}, title = {{ALRS:} An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {490--509}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_25}, doi = {10.1007/978-3-030-90567-5\_25}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenDCRLLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenWZXQ21, author = {Liuqiao Chen and Hu Wang and Benjamin Zi Hao Zhao and Minhui Xue and Haifeng Qian}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {550--568}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_28}, doi = {10.1007/978-3-030-90567-5\_28}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenWZXQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CheonKKLSS21, author = {Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Joohee Lee and Junbum Shin and Yongsoo Song}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Lattice-Based Secure Biometric Authentication for Hamming Distance}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {653--672}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_33}, doi = {10.1007/978-3-030-90567-5\_33}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CheonKKLSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChiuM21, author = {Wei{-}Yang Chiu and Weizhi Meng}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Mind the Scraps: Attacking Blockchain Based on Selfdestruct}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {451--469}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_23}, doi = {10.1007/978-3-030-90567-5\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChiuM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CouteauRR21, author = {Geoffroy Couteau and A. W. Roscoe and Peter Y. A. Ryan}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {330--349}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_17}, doi = {10.1007/978-3-030-90567-5\_17}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CouteauRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiY21, author = {Handong Cui and Tsz Hon Yuen}, editor = {Joonsang Baek and Sushmita Ruj}, title = {A Trustless {GQ} Multi-signature Scheme with Identifiable Abort}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {673--693}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_34}, doi = {10.1007/978-3-030-90567-5\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CuiY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuttaS21, author = {Sabyasachi Dutta and Reihaneh Safavi{-}Naini}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Leakage Resilient Cheating Detectable Secret Sharing Schemes}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {3--23}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_1}, doi = {10.1007/978-3-030-90567-5\_1}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DuttaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuttaSDR21, author = {Priyanka Dutta and Willy Susilo and Dung Hoang Duong and Partha Sarathi Roy}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Puncturable Identity-Based Encryption from Lattices}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {571--589}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_29}, doi = {10.1007/978-3-030-90567-5\_29}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DuttaSDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ElSheikhY21, author = {Muhammad ElSheikh and Amr M. Youssef}, editor = {Joonsang Baek and Sushmita Ruj}, title = {On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {111--131}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_6}, doi = {10.1007/978-3-030-90567-5\_6}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ElSheikhY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FanWLLYW21, author = {Yanhong Fan and Weijia Wang and Zhihu Li and Zhenyu Lu and Siu{-}Ming Yiu and Meiqin Wang}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Forced Independent Optimized Implementation of 4-Bit S-Box}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {151--170}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_8}, doi = {10.1007/978-3-030-90567-5\_8}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FanWLLYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GalbraithL21, author = {Steven D. Galbraith and Trey Li}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Small Superset and Big Subset Obfuscation}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {68--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_4}, doi = {10.1007/978-3-030-90567-5\_4}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GalbraithL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HainesM21, author = {Thomas Haines and Johannes M{\"{u}}ller}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Optimal Randomized Partial Checking for Decryption Mix Nets}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {277--292}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_14}, doi = {10.1007/978-3-030-90567-5\_14}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HainesM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HainesM21a, author = {Thomas Haines and Johannes M{\"{u}}ller}, editor = {Joonsang Baek and Sushmita Ruj}, title = {A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {293--308}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_15}, doi = {10.1007/978-3-030-90567-5\_15}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HainesM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HokiIILS21, author = {Jin Hoki and Takanori Isobe and Ryoma Ito and Fukang Liu and Kosei Sakamoto}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Distinguishing and Key Recovery Attacks on the Reduced-Round {SNOW-V}}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {171--190}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_9}, doi = {10.1007/978-3-030-90567-5\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HokiIILS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IsobeI21, author = {Takanori Isobe and Ryoma Ito}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Security Analysis of End-to-End Encryption for Zoom Meetings}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {234--253}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_12}, doi = {10.1007/978-3-030-90567-5\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/IsobeI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiSYPYL21, author = {Yannan Li and Willy Susilo and Guomin Yang and Tran Viet Xuan Phuong and Yong Yu and Dongxi Liu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Concise Mercurial Subvector Commitments: Definitions and Constructions}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {353--371}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_18}, doi = {10.1007/978-3-030-90567-5\_18}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiSYPYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiW21, author = {Xiaodan Li and Wenling Wu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Constructions of Iterative Near-MDS Matrices with the Lowest {XOR} Count}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {132--150}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_7}, doi = {10.1007/978-3-030-90567-5\_7}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuHYSTH21, author = {Xueqiao Liu and Kai He and Guomin Yang and Willy Susilo and Joseph Tonien and Qiong Huang}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Broadcast Authenticated Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {193--213}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_10}, doi = {10.1007/978-3-030-90567-5\_10}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuHYSTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuIMY21, author = {Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Algebraic Attacks on Round-Reduced Keccak}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {91--110}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_5}, doi = {10.1007/978-3-030-90567-5\_5}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuIMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLHXW21, author = {Yizhong Liu and Jianwei Liu and Yiming Hei and Yu Xia and Qianhong Wu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {A Secure Cross-Shard View-Change Protocol for Sharding Blockchains}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {372--390}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_19}, doi = {10.1007/978-3-030-90567-5\_19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuLHXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuWZ21, author = {Chao Liu and Anyu Wang and Zhongxiang Zheng}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Optimizing Bootstrapping and Evaluating Large {FHE} Gates in the LWE-Based {GSW-FHE}}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {590--609}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_30}, doi = {10.1007/978-3-030-90567-5\_30}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PalD21, author = {Tapas Pal and Ratna Dutta}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Chosen Ciphertext Secure Functional Encryption from Constrained Witness {PRF}}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {24--45}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_2}, doi = {10.1007/978-3-030-90567-5\_2}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PalD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PalD21a, author = {Tapas Pal and Ratna Dutta}, editor = {Joonsang Baek and Sushmita Ruj}, title = {{CCA} Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {254--274}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_13}, doi = {10.1007/978-3-030-90567-5\_13}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PalD21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanCZS21, author = {Jing Pan and Xiaofeng Chen and Fangguo Zhang and Willy Susilo}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Forward-Secure Group Encryptions from Lattices}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {610--629}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_31}, doi = {10.1007/978-3-030-90567-5\_31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PanCZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QiWWHCXZ21, author = {Minfeng Qi and Ziyuan Wang and Fan Wu and Rob Hanson and Shiping Chen and Yang Xiang and Liming Zhu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {473--489}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_24}, doi = {10.1007/978-3-030-90567-5\_24}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/QiWWHCXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TaKNLDSFK21, author = {Anh The Ta and Thanh Xuan Khuc and Tuong Ngoc Nguyen and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Efficient Unique Ring Signature for Blockchain Privacy Protection}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {391--407}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_20}, doi = {10.1007/978-3-030-90567-5\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TaKNLDSFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TsuchidaN21, author = {Hikaru Tsuchida and Takashi Nishide}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Private Decision Tree Evaluation with Constant Rounds via (Only) Fair {SS-4PC}}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {309--329}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_16}, doi = {10.1007/978-3-030-90567-5\_16}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TsuchidaN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WijayaLSL21, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Dongxi Liu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Transparency or Anonymity Leak: Monero Mining Pools Data Publication}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {433--450}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_22}, doi = {10.1007/978-3-030-90567-5\_22}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WijayaLSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YehiaAG21, author = {Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Verifiable Obtained Random Subsets for Improving SPHINCS\({}^{\mbox{+}}\)}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {694--714}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_35}, doi = {10.1007/978-3-030-90567-5\_35}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YehiaAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLWL21, author = {Zongyang Zhang and Tong Li and Zhuo Wang and Jianwei Liu}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority {CP-ABE}}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {408--429}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_21}, doi = {10.1007/978-3-030-90567-5\_21}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZongCS21, author = {Wei Zong and Yang{-}Wai Chow and Willy Susilo}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {531--549}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_27}, doi = {10.1007/978-3-030-90567-5\_27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZongCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2021, editor = {Joonsang Baek and Sushmita Ruj}, title = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5}, doi = {10.1007/978-3-030-90567-5}, isbn = {978-3-030-90566-8}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlkadriB020, author = {Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann}, editor = {Joseph K. Liu and Hui Cui}, title = {On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {41--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_3}, doi = {10.1007/978-3-030-55304-3\_3}, timestamp = {Wed, 17 Aug 2022 14:32:12 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AlkadriB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaksiKKBSC20, author = {Anubhab Baksi and Vinay B. Y. Kumar and Banashri Karmakar and Shivam Bhasin and Dhiman Saha and Anupam Chattopadhyay}, editor = {Joseph K. Liu and Hui Cui}, title = {A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {525--542}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_27}, doi = {10.1007/978-3-030-55304-3\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaksiKKBSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChatterjeeK20, author = {Sanjit Chatterjee and R. Kabaleeshwaran}, editor = {Joseph K. Liu and Hui Cui}, title = {From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on {SXDH} Assumption}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {183--203}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_10}, doi = {10.1007/978-3-030-55304-3\_10}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChatterjeeK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenLCP20, author = {Jinrong Chen and Lin Liu and Rongmao Chen and Wei Peng}, editor = {Joseph K. Liu and Hui Cui}, title = {{SHOSVD:} Secure Outsourcing of High-Order Singular Value Decomposition}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {309--329}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_16}, doi = {10.1007/978-3-030-55304-3\_16}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenLCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamodaranR20, author = {Aditya Damodaran and Alfredo Rial}, editor = {Joseph K. Liu and Hui Cui}, title = {Unlinkable Updatable Databases and Oblivious Transfer with Access Control}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {584--604}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_30}, doi = {10.1007/978-3-030-55304-3\_30}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DamodaranR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DaviesGGJ20, author = {Gareth T. Davies and Herman Galteland and Kristian Gj{\o}steen and Yao Jiang}, editor = {Joseph K. Liu and Hui Cui}, title = {Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {82--101}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_5}, doi = {10.1007/978-3-030-55304-3\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DaviesGGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuFW20, author = {Yusong Du and Baoying Fan and Baodian Wei}, editor = {Joseph K. Liu and Hui Cui}, title = {Arbitrary-Centered Discrete Gaussian Sampling over the Integers}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {391--407}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_20}, doi = {10.1007/978-3-030-55304-3\_20}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GongCZ20, author = {Boru Gong and Leixiao Cheng and Yunlei Zhao}, editor = {Joseph K. Liu and Hui Cui}, title = {{SKCN:} Practical and Flexible Digital Signature from Module Lattice}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {62--81}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_4}, doi = {10.1007/978-3-030-55304-3\_4}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GongCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoLLZCZ20, author = {Xiaoyu Guo and Yan Liu and Lian Liu and Guangsheng Zhang and Jing Chen and Yuan Zhao}, editor = {Joseph K. Liu and Hui Cui}, title = {User Identity Linkage Across Social Networks via Community Preserving Network Embedding}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {621--630}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_32}, doi = {10.1007/978-3-030-55304-3\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuoLLZCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Huang0HG20, author = {Junhao Huang and Zhe Liu and Zhi Hu and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Joseph K. Liu and Hui Cui}, title = {Parallel Implementation of {SM2} Elliptic Curve Cryptography on Intel Processors with {AVX2}}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {204--224}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_11}, doi = {10.1007/978-3-030-55304-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Huang0HG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangZHL20, author = {Yan Huang and Fangguo Zhang and Zhi Hu and Zhijie Liu}, editor = {Joseph K. Liu and Hui Cui}, title = {Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {23--40}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_2}, doi = {10.1007/978-3-030-55304-3\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HuangZHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JangJWK20, author = {Hanbin Jang and Woojoong Ji and Simon S. Woo and Hyoungshick Kim}, editor = {Joseph K. Liu and Hui Cui}, title = {Design and Evaluation of Enumeration Attacks on Package Tracking Systems}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {543--559}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_28}, doi = {10.1007/978-3-030-55304-3\_28}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JangJWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JinM20, author = {Yaoan Jin and Atsuko Miyaji}, editor = {Joseph K. Liu and Hui Cui}, title = {Secure and Compact Elliptic Curve {LR} Scalar Multiplication}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {605--618}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_31}, doi = {10.1007/978-3-030-55304-3\_31}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JinM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimAK20, author = {Bedeuro Kim and Sharif Abuadbba and Hyoungshick Kim}, editor = {Joseph K. Liu and Hui Cui}, title = {DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {461--475}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_24}, doi = {10.1007/978-3-030-55304-3\_24}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KoikeSH020, author = {Yuji Koike and Kosei Sakamoto and Takuya Hayashi and Takanori Isobe}, editor = {Joseph K. Liu and Hui Cui}, title = {Galaxy: {A} Family of Stream-Cipher-Based Space-Hard Ciphers}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {142--159}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_8}, doi = {10.1007/978-3-030-55304-3\_8}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KoikeSH020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kurek20, author = {Rafael Kurek}, editor = {Joseph K. Liu and Hui Cui}, title = {Efficient Forward-Secure Threshold Public Key Encryption}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {330--349}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_17}, doi = {10.1007/978-3-030-55304-3\_17}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kurek20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeDSTTPP20, author = {Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Ha Thanh Nguyen Tran and Viet Cuong Trinh and Josef Pieprzyk and Thomas Plantard}, editor = {Joseph K. Liu and Hui Cui}, title = {Lattice Blind Signatures with Forward Security}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {3--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_1}, doi = {10.1007/978-3-030-55304-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeDSTTPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiYYGYG20, author = {Linyu Li and Lei Yu and Can Yang and Jie Gou and Jiawei Yin and Xiaorui Gong}, editor = {Joseph K. Liu and Hui Cui}, title = {Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {479--504}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_25}, doi = {10.1007/978-3-030-55304-3\_25}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiYYGYG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuHDBNL20, author = {Xiaolei Liu and Teng Hu and Kangyi Ding and Yang Bai and Weina Niu and Jiazhong Lu}, editor = {Joseph K. Liu and Hui Cui}, title = {A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {268--284}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_14}, doi = {10.1007/978-3-030-55304-3\_14}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuHDBNL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLG20, author = {Xiangyu Liu and Shengli Liu and Dawu Gu}, editor = {Joseph K. Liu and Hui Cui}, title = {Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {664--673}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_36}, doi = {10.1007/978-3-030-55304-3\_36}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuLASL20, author = {Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li}, editor = {Joseph K. Liu and Hui Cui}, title = {Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {105--124}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_6}, doi = {10.1007/978-3-030-55304-3\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuLASL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Ma0M20, author = {Zuchao Ma and Liang Liu and Weizhi Meng}, editor = {Joseph K. Liu and Hui Cui}, title = {{DCONST:} Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {247--267}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_13}, doi = {10.1007/978-3-030-55304-3\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Ma0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NitajST20, author = {Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, editor = {Joseph K. Liu and Hui Cui}, title = {A New Improved {AES} S-box with Enhanced Properties}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {125--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_7}, doi = {10.1007/978-3-030-55304-3\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NitajST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Okada0T20, author = {Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Hui Cui}, title = {Improving Key Mismatch Attack on NewHope with Fewer Queries}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {505--524}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_26}, doi = {10.1007/978-3-030-55304-3\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Okada0T20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OonishiK20, author = {Kento Oonishi and Noboru Kunihiro}, editor = {Joseph K. Liu and Hui Cui}, title = {Recovering {CRT-RSA} Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {642--652}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_34}, doi = {10.1007/978-3-030-55304-3\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OonishiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PangCFT20, author = {Bo Pang and Long Chen and Xiong Fan and Qiang Tang}, editor = {Joseph K. Liu and Hui Cui}, title = {Multi-input Laconic Function Evaluation}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {369--388}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_19}, doi = {10.1007/978-3-030-55304-3\_19}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PangCFT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunTA20, author = {Chao Sun and Mehdi Tibouchi and Masayuki Abe}, editor = {Joseph K. Liu and Hui Cui}, title = {Revisiting the Hardness of Binary Error {LWE}}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {425--444}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_22}, doi = {10.1007/978-3-030-55304-3\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunTA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TezukaT20, author = {Masayuki Tezuka and Keisuke Tanaka}, editor = {Joseph K. Liu and Hui Cui}, title = {Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {225--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_12}, doi = {10.1007/978-3-030-55304-3\_12}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TezukaT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangLLW20, author = {Tongchen Wang and Jianwei Liu and Dawei Li and Qianhong Wu}, editor = {Joseph K. Liu and Hui Cui}, title = {A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {285--305}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_15}, doi = {10.1007/978-3-030-55304-3\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WangLLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangW0X20, author = {Bozhi Wang and Qin Wang and Shiping Chen and Yang Xiang}, editor = {Joseph K. Liu and Hui Cui}, title = {Security Analysis on Tangle-Based Blockchain Through Simulation}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {653--663}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_35}, doi = {10.1007/978-3-030-55304-3\_35}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangW0X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenZXQ20, author = {Jialin Wen and Benjamin Zi Hao Zhao and Minhui Xue and Haifeng Qian}, editor = {Joseph K. Liu and Hui Cui}, title = {{PALOR:} Poisoning Attacks Against Logistic Regression}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {447--460}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_23}, doi = {10.1007/978-3-030-55304-3\_23}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenZXQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaYZZ020, author = {Zhe Xia and Bo Yang and Yanwei Zhou and Mingwu Zhang and Yi Mu}, editor = {Joseph K. Liu and Hui Cui}, title = {Improvement of Attribute-Based Encryption Using Blakley Secret Sharing}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {631--641}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_33}, doi = {10.1007/978-3-030-55304-3\_33}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XiaYZZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XieFHLP20, author = {Mengfei Xie and Jianming Fu and Jia He and Chenke Luo and Guojun Peng}, editor = {Joseph K. Liu and Hui Cui}, title = {JTaint: Finding Privacy-Leakage in Chrome Extensions}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {563--583}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_29}, doi = {10.1007/978-3-030-55304-3\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XieFHLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XieZYL20, author = {Zhijie Xie and Min Zhang and Anqi Yin and Zhenhan Li}, editor = {Joseph K. Liu and Hui Cui}, title = {A New Targeted Password Guessing Model}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {350--368}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_18}, doi = {10.1007/978-3-030-55304-3\_18}, timestamp = {Mon, 10 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XieZYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YeohTC20, author = {Wei{-}Zhu Yeoh and Je Sen Teh and Jiageng Chen}, editor = {Joseph K. Liu and Hui Cui}, title = {Automated Search for Block Cipher Differentials: {A} GPU-Accelerated Branch-and-Bound Algorithm}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {160--179}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_9}, doi = {10.1007/978-3-030-55304-3\_9}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YeohTC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhaoCDSWL20, author = {Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu}, editor = {Joseph K. Liu and Hui Cui}, title = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {408--424}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_21}, doi = {10.1007/978-3-030-55304-3\_21}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhaoCDSWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2020, editor = {Joseph K. Liu and Hui Cui}, title = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3}, doi = {10.1007/978-3-030-55304-3}, isbn = {978-3-030-55303-6}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Ashouri19, author = {Mohammadreza Ashouri}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {494--513}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_27}, doi = {10.1007/978-3-030-21548-4\_27}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Ashouri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiLWG19, author = {Nan Cui and Shengli Liu and Yunhua Wen and Dawu Gu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Pseudorandom Functions from {LWE:} {RKA} Security and Application}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {229--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_13}, doi = {10.1007/978-3-030-21548-4\_13}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CuiLWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CurryCFM19, author = {Timothy Curry and Devon Callahan and Benjamin Fuller and Laurent Michel}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {{DOCSDN:} Dynamic and Optimal Configuration of Software-Defined Networks}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {456--474}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_25}, doi = {10.1007/978-3-030-21548-4\_25}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CurryCFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DavidsonDLM19, author = {Alex Davidson and Amit Deo and Ela Lee and Keith Martin}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Strong Post-Compromise Secure Proxy Re-Encryption}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {58--77}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_4}, doi = {10.1007/978-3-030-21548-4\_4}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DavidsonDLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuongFK0S19, author = {Dung Hoang Duong and Kazuhide Fukushima and Shinsaku Kiyomoto and Partha Sarathi Roy and Willy Susilo}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Lattice-Based Public Key Encryption with Equality Test in Standard Model}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {138--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_8}, doi = {10.1007/978-3-030-21548-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuongFK0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FanTLL19, author = {Xuejun Fan and Song Tian and Bao Li and Weixuan Li}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {630--638}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_35}, doi = {10.1007/978-3-030-21548-4\_35}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FanTLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangCYSHC19, author = {Yi{-}Ting Huang and Yu{-}Yuan Chen and Chih{-}Chun Yang and Yeali S. Sun and Shun{-}Wen Hsiao and Meng Chang Chen}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {660--668}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_38}, doi = {10.1007/978-3-030-21548-4\_38}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuangCYSHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IchikawaOHK19, author = {Atsunori Ichikawa and Wakaha Ogata and Koki Hamada and Ryo Kikuchi}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Efficient Secure Multi-Party Protocols for Decision Tree Classification}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {362--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_20}, doi = {10.1007/978-3-030-21548-4\_20}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IchikawaOHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiKKK19, author = {Woojoong Ji and Taeyun Kim and Kuyju Kim and Hyoungshick Kim}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Automated Cash Mining Attacks on Mobile Advertising Networks}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {679--686}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_40}, doi = {10.1007/978-3-030-21548-4\_40}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiKKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JinM19, author = {Yaoan Jin and Atsuko Miyaji}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Secure and Compact Elliptic Curve Cryptosystems}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {639--650}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_36}, doi = {10.1007/978-3-030-21548-4\_36}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JinM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KampSJP19, author = {Tim van de Kamp and David Stritzl and Willem Jonker and Andreas Peter}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Two-Client and Multi-client Functional Encryption for Set Intersection}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {97--115}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_6}, doi = {10.1007/978-3-030-21548-4\_6}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KampSJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KikuchiAHII00S19, author = {Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {343--361}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_19}, doi = {10.1007/978-3-030-21548-4\_19}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KikuchiAHII00S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimSBNL19, author = {Jongkil Kim and Willy Susilo and Joonsang Baek and Surya Nepal and Dongxi Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Ciphertext-Delegatable {CP-ABE} for a Dynamic Credential: {A} Modular Approach}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {3--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_1}, doi = {10.1007/978-3-030-21548-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimSBNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KraitsbergLOSA19, author = {Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based {CCA} Encryption Scheme}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {192--210}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_11}, doi = {10.1007/978-3-030-21548-4\_11}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KraitsbergLOSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LauT19, author = {Terry Shue Chien Lau and Chik How Tan}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {211--228}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_12}, doi = {10.1007/978-3-030-21548-4\_12}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LauT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Li0LF19, author = {Weixuan Li and Wei Yu and Bao Li and Xuejun Fan}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Speeding up Scalar Multiplication on Koblitz Curves Using {\textbackslash}mu {\_}4 Coordinates}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {620--629}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_34}, doi = {10.1007/978-3-030-21548-4\_34}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Li0LF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLZ19, author = {Geng Li and Jianwei Liu and Zongyang Zhang}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Security Against Subversion in a Multi-surveillant Setting}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {419--437}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_23}, doi = {10.1007/978-3-030-21548-4\_23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiMS19, author = {Dunming Li and Jenwen Mao and Fuke Shen}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Novel Semi-supervised Adaboost Technique Based on Improved Tri-training}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {669--678}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_39}, doi = {10.1007/978-3-030-21548-4\_39}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LingMHXL19, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ru Xiang and Ximing Li}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Group ID-Based Encryption with Equality Test}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {39--57}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_3}, doi = {10.1007/978-3-030-21548-4\_3}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LingMHXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuS19, author = {Yunwen Liu and Yu Sasaki}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Related-Key Boomerang Attacks on {GIFT} with Automated Trail Search Including {BCT} Effect}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {555--572}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_30}, doi = {10.1007/978-3-030-21548-4\_30}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MurphyP19, author = {Sean Murphy and Rachel Player}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {{\textbackslash}delta -subgaussian Random Variables in Cryptography}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {251--268}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_14}, doi = {10.1007/978-3-030-21548-4\_14}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MurphyP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Naito19, author = {Yusuke Naito}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Highly Secure {MAC} from Tweakable Blockciphers with Support for Short Tweaks}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {588--606}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_32}, doi = {10.1007/978-3-030-21548-4\_32}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Naito19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PalD19, author = {Tapas Pal and Ratna Dutta}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Offline Witness Encryption from Witness {PRF} and Randomized Encoding in {CRS} Model}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {78--96}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_5}, doi = {10.1007/978-3-030-21548-4\_5}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PalD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanLLN19, author = {Dongxue Pan and Bei Liang and Hongda Li and Peifang Ni}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {609--619}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_33}, doi = {10.1007/978-3-030-21548-4\_33}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PangYLM19, author = {Xiaojian Pang and Li Yang and Maozhen Liu and Jianfeng Ma}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {533--551}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_29}, doi = {10.1007/978-3-030-21548-4\_29}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PangYLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhuongSY0L19, author = {Tran Viet Xuan Phuong and Willy Susilo and Guomin Yang and Jun Yan and Dongxi Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Location Based Encryption}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {21--38}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_2}, doi = {10.1007/978-3-030-21548-4\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhuongSY0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SadhyaC19, author = {Debanjan Sadhya and Bodhi Chakraborty}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {651--659}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_37}, doi = {10.1007/978-3-030-21548-4\_37}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SadhyaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SchabhuserB019, author = {Lucas Schabh{\"{u}}ser and Denis Butin and Johannes Buchmann}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Function-Dependent Commitments from Homomorphic Authenticators}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {399--418}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_22}, doi = {10.1007/978-3-030-21548-4\_22}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SchabhuserB019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShenYCZ19, author = {Jaryn Shen and Timothy T. Yuen and Kim{-}Kwang Raymond Choo and Qingkai Zeng}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {{AMOGAP:} Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {514--532}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_28}, doi = {10.1007/978-3-030-21548-4\_28}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ShenYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SipasseuthPS19, author = {Arnaud Sipasseuth and Thomas Plantard and Willy Susilo}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Improving the Security of the {DRS} Scheme with Uniformly Chosen Random Noise}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {119--137}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_7}, doi = {10.1007/978-3-030-21548-4\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SipasseuthPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloTY19, author = {Willy Susilo and Joseph Tonien and Guomin Yang}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {The Wiener Attack on {RSA} Revisited: {A} Quest for the Exact Bound}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {381--398}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_21}, doi = {10.1007/978-3-030-21548-4\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SusiloTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TangCLL19, author = {Shuyang Tang and Sherman S. M. Chow and Zhiqiang Liu and Joseph K. Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Fast-to-Finalize Nakamoto-Like Consensus}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {271--288}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_15}, doi = {10.1007/978-3-030-21548-4\_15}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TangCLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TorresKSSLC19, author = {Wilson Abel Alberto Torres and Veronika Kuchta and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Jacob Cheng}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Lattice RingCT {V2.0} with Multiple Input and Multiple Output Wallets}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {156--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_9}, doi = {10.1007/978-3-030-21548-4\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TorresKSSLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangH19, author = {Li{-}Ping Wang and Jingwei Hu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Two New Module-Code-Based KEMs with Rank Metric}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {176--191}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_10}, doi = {10.1007/978-3-030-21548-4\_10}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangLZZYYL19, author = {Ziyu Wang and Jianwei Liu and Zongyang Zhang and Yanting Zhang and Jiayuan Yin and Hui Yu and Wenmao Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Combined Micro-block Chain Truncation Attack on Bitcoin-NG}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {322--339}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_18}, doi = {10.1007/978-3-030-21548-4\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WangLZZYYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WijayaLSL19, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Dongxi Liu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Risk of Asynchronous Protocol Update: Attacks to Monero Protocols}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {307--321}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_17}, doi = {10.1007/978-3-030-21548-4\_17}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WijayaLSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengHLMZT19, author = {Liang Zheng and Donglei Han and Zongbin Liu and Cunqing Ma and Lingchen Zhang and Churan Tang}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Low Overhead Error Correction Algorithm Using Random Permutation for {SRAM} PUFs}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {475--493}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_26}, doi = {10.1007/978-3-030-21548-4\_26}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhengHLMZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhongWXQLW19, author = {Lin Zhong and Huili Wang and Jan Xie and Bo Qin and Joseph K. Liu and Qianhong Wu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Flexible Instant Payment System Based on Blockchain}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {289--306}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_16}, doi = {10.1007/978-3-030-21548-4\_16}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhongWXQLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuWZ19, author = {Chunbo Zhu and Gaoli Wang and Boyu Zhu}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Fast Chosen-Key Distinguish Attacks on Round-Reduced {AES-192}}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {573--587}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_31}, doi = {10.1007/978-3-030-21548-4\_31}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhuWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZongCS19, author = {Wei Zong and Yang{-}Wai Chow and Willy Susilo}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Dimensionality Reduction and Visualization of Network Intrusion Detection Data}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {441--455}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_24}, doi = {10.1007/978-3-030-21548-4\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZongCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2019, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4}, doi = {10.1007/978-3-030-21548-4}, isbn = {978-3-030-21547-7}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AhmadiSA18, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini and Md. Mamunur Rashid Akand}, editor = {Willy Susilo and Guomin Yang}, title = {New Attacks and Secure Design for Anonymous Distance-Bounding}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {598--616}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_34}, doi = {10.1007/978-3-319-93638-3\_34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AhmadiSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AnadaKMW18, author = {Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki and Yohei Watanabe}, editor = {Willy Susilo and Guomin Yang}, title = {Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {341--359}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_20}, doi = {10.1007/978-3-319-93638-3\_20}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AnadaKMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BarbarSZCX18, author = {Mohamad Barbar and Yulei Sui and Hongyu Zhang and Shiping Chen and Jingling Xue}, editor = {Willy Susilo and Guomin Yang}, title = {Live Path {CFI} Against Control Flow Hijacking Attacks}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {768--779}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_45}, doi = {10.1007/978-3-319-93638-3\_45}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BarbarSZCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoyenH18, author = {Xavier Boyen and Thomas Haines}, editor = {Willy Susilo and Guomin Yang}, title = {Forward-Secure Linkable Ring Signatures}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {245--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_15}, doi = {10.1007/978-3-319-93638-3\_15}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoyenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CheonJKL18, author = {Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee}, editor = {Willy Susilo and Guomin Yang}, title = {A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {28--44}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_3}, doi = {10.1007/978-3-319-93638-3\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CheonJKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiHX018, author = {Jie Cui and Jiantao He and Yan Xu and Hong Zhong}, editor = {Willy Susilo and Guomin Yang}, title = {{TDDAD:} Time-Based Detection and Defense Scheme Against DDoS Attack on {SDN} Controller}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {649--665}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_37}, doi = {10.1007/978-3-319-93638-3\_37}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiHX018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DavidDL18, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, editor = {Willy Susilo and Guomin Yang}, title = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {45--63}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_4}, doi = {10.1007/978-3-319-93638-3\_4}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DavidDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DingFR18, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, editor = {Willy Susilo and Guomin Yang}, title = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal Leakage}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {467--486}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_27}, doi = {10.1007/978-3-319-93638-3\_27}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DingFR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Heys18, author = {Howard M. Heys}, editor = {Willy Susilo and Guomin Yang}, title = {Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode)}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {135--153}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_9}, doi = {10.1007/978-3-319-93638-3\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Heys18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuLCL18, author = {Ziyuan Hu and Shengli Liu and Kefei Chen and Joseph K. Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {265--283}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_16}, doi = {10.1007/978-3-319-93638-3\_16}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuLCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuZ18, author = {Kexin Hu and Zhenfeng Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Fast Lottery-Based Micropayments for Decentralized Currencies}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {669--686}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_38}, doi = {10.1007/978-3-319-93638-3\_38}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ItoM18, author = {Ryoma Ito and Atsuko Miyaji}, editor = {Willy Susilo and Guomin Yang}, title = {New Iterated {RC4} Key Correlations}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {154--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_10}, doi = {10.1007/978-3-319-93638-3\_10}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ItoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KikuchiIMHC18, author = {Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida}, editor = {Willy Susilo and Guomin Yang}, title = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {64--82}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_5}, doi = {10.1007/978-3-319-93638-3\_5}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KikuchiIMHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KilincV18, author = {Handan Kilin{\c{c}} and Serge Vaudenay}, editor = {Willy Susilo and Guomin Yang}, title = {Secure Contactless Payment}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {579--597}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_33}, doi = {10.1007/978-3-319-93638-3\_33}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KilincV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimLP18, author = {Eunkyung Kim and Hyang{-}Sook Lee and Jeongeun Park}, editor = {Willy Susilo and Guomin Yang}, title = {Towards Round-Optimal Secure Multiparty Computations: Multikey {FHE} Without a {CRS}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {101--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_7}, doi = {10.1007/978-3-319-93638-3\_7}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiHAM18, author = {Junzuo Lai and Zhengan Huang and Man Ho Au and Xianping Mao}, editor = {Willy Susilo and Guomin Yang}, title = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {805--812}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_49}, doi = {10.1007/978-3-319-93638-3\_49}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiYYCD18, author = {Qiqi Lai and Bo Yang and Yong Yu and Yuan Chen and Liju Dong}, editor = {Willy Susilo and Guomin Yang}, title = {Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {539--557}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_31}, doi = {10.1007/978-3-319-93638-3\_31}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiYYCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LauT18, author = {Terry Shue Chien Lau and Chik How Tan}, editor = {Willy Susilo and Guomin Yang}, title = {A New Encryption Scheme Based on Rank Metric Codes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {750--758}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_43}, doi = {10.1007/978-3-319-93638-3\_43}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LauT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeWZ18, author = {Hyung Tae Lee and Huaxiong Wang and Kai Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Security Analysis and Modification of ID-Based Encryption with Equality Test from {ACISP} 2017}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {780--786}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_46}, doi = {10.1007/978-3-319-93638-3\_46}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLNP18, author = {Haoyu Li and Renzhang Liu and Abderrahmane Nitaj and Yanbin Pan}, editor = {Willy Susilo and Guomin Yang}, title = {Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {455--466}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_26}, doi = {10.1007/978-3-319-93638-3\_26}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiLNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLX18, author = {Shimin Li and Bei Liang and Rui Xue}, editor = {Willy Susilo and Guomin Yang}, title = {Private Functional Signatures: Definition and Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {284--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_17}, doi = {10.1007/978-3-319-93638-3\_17}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuCWW18, author = {Chi Liu and Rongmao Chen and Yi Wang and Yongjun Wang}, editor = {Willy Susilo and Guomin Yang}, title = {Asymmetric Subversion Attacks on Signature Schemes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {376--395}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_22}, doi = {10.1007/978-3-319-93638-3\_22}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18, author = {Lin Liu and Jinshu Su and Rongmao Chen and Ximeng Liu and Xiaofeng Wang and Shuhui Chen and Ho{-}fung Leung}, editor = {Willy Susilo and Guomin Yang}, title = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {431--451}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_25}, doi = {10.1007/978-3-319-93638-3\_25}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuZA18, author = {Xingye Lu and Zhenfei Zhang and Man Ho Au}, editor = {Willy Susilo and Guomin Yang}, title = {Practical Signatures from the Partial Fourier Recovery Problem Revisited: {A} Provably-Secure and Gaussian-Distributed Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {813--820}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_50}, doi = {10.1007/978-3-319-93638-3\_50}, timestamp = {Tue, 10 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuZA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaWL18, author = {Xuecheng Ma and Xin Wang and Dongdai Lin}, editor = {Willy Susilo and Guomin Yang}, title = {Anonymous Identity-Based Encryption with Identity Recovery}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {360--375}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_21}, doi = {10.1007/978-3-319-93638-3\_21}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MarriereNV18, author = {Nicolas Marri{\`{e}}re and Val{\'{e}}rie Nachef and Emmanuel Volte}, editor = {Willy Susilo and Guomin Yang}, title = {Differential Attacks on Reduced Round {LILLIPUT}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {188--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_12}, doi = {10.1007/978-3-319-93638-3\_12}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MarriereNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MengWLLLP18, author = {Weizhi Meng and Yu Wang and Wenjuan Li and Zhe Liu and Jin Li and Christian W. Probst}, editor = {Willy Susilo and Guomin Yang}, title = {Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {759--767}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_44}, doi = {10.1007/978-3-319-93638-3\_44}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MengWLLLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Naito18, author = {Yusuke Naito}, editor = {Willy Susilo and Guomin Yang}, title = {Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {225--242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_14}, doi = {10.1007/978-3-319-93638-3\_14}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Naito18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PaulS18, author = {Souradyuti Paul and Ananya Shrivastava}, editor = {Willy Susilo and Guomin Yang}, title = {Robust Multiparty Computation with Faster Verification Time}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {114--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_8}, doi = {10.1007/978-3-319-93638-3\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PaulS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengLKZH18, author = {Liqiang Peng and Yao Lu and Noboru Kunihiro and Rui Zhang and Lei Hu}, editor = {Willy Susilo and Guomin Yang}, title = {A Deterministic Algorithm for Computing Divisors in an Interval}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {3--12}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_1}, doi = {10.1007/978-3-319-93638-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SarkarBN18, author = {Pinaki Sarkar and Mayank Baranwal and Sukumar Nandi}, editor = {Willy Susilo and Guomin Yang}, title = {{CRT-KPS:} {A} Key Predistribution Schemes Using {CRT}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {821--830}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_51}, doi = {10.1007/978-3-319-93638-3\_51}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SarkarBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SarkarS18, author = {Sumanta Sarkar and Habeeb Syed}, editor = {Willy Susilo and Guomin Yang}, title = {Bounds on Differential and Linear Branch Number of Permutations}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {207--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_13}, doi = {10.1007/978-3-319-93638-3\_13}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SarkarS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18, author = {Jian Shen and Dengzhi Liu and Xiaofeng Chen and Xinyi Huang and Jiageng Chen and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {417--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_24}, doi = {10.1007/978-3-319-93638-3\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunCHC18, author = {Yeali S. Sun and Chien{-}Chun Chen and Shun{-}Wen Hsiao and Meng Chang Chen}, editor = {Willy Susilo and Guomin Yang}, title = {ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {796--804}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_48}, doi = {10.1007/978-3-319-93638-3\_48}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunCHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunZF18, author = {Yinxia Sun and Futai Zhang and Anmin Fu}, editor = {Willy Susilo and Guomin Yang}, title = {Revocable Certificateless Encryption with Ciphertext Evolution}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {741--749}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_42}, doi = {10.1007/978-3-319-93638-3\_42}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunZF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TorresSSLKBAC18, author = {Wilson Abel Alberto Torres and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Veronika Kuchta and Nandita Bhattacharjee and Man Ho Au and Jacob Cheng}, editor = {Willy Susilo and Guomin Yang}, title = {Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {558--576}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_32}, doi = {10.1007/978-3-319-93638-3\_32}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TorresSSLKBAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangIDT18, author = {Yacheng Wang and Yasuhiko Ikematsu and Dung Hoang Duong and Tsuyoshi Takagi}, editor = {Willy Susilo and Guomin Yang}, title = {Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {487--501}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_28}, doi = {10.1007/978-3-319-93638-3\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangIDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT18, author = {Yuntao Wang and Tsuyoshi Takagi}, editor = {Willy Susilo and Guomin Yang}, title = {Improving the {BKZ} Reduction Algorithm by Quick Reordering Technique}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {787--795}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_47}, doi = {10.1007/978-3-319-93638-3\_47}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenL18, author = {Yunhua Wen and Shengli Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Reusable Fuzzy Extractor from {LWE}}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {13--27}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_2}, doi = {10.1007/978-3-319-93638-3\_2}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaS0ZZ18, author = {Zhe Xia and Liuying Sun and Bo Yang and Yanwei Zhou and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {83--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_6}, doi = {10.1007/978-3-319-93638-3\_6}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XiaS0ZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuDC018, author = {Yan Xu and Ran Ding and Jie Cui and Hong Zhong}, editor = {Willy Susilo and Guomin Yang}, title = {Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {399--416}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_23}, doi = {10.1007/978-3-319-93638-3\_23}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XuDC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangAXY18, author = {Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu}, editor = {Willy Susilo and Guomin Yang}, title = {Decentralized Blacklistable Anonymous Credentials with Reputation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {720--738}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_41}, doi = {10.1007/978-3-319-93638-3\_41}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangAXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YeT18, author = {Chen{-}Dong Ye and Tian Tian}, editor = {Willy Susilo and Guomin Yang}, title = {A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {172--187}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_11}, doi = {10.1007/978-3-319-93638-3\_11}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YeT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YinWZL18, author = {Jiayuan Yin and Changren Wang and Zongyang Zhang and Jianwei Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Revisiting the Incentive Mechanism of Bitcoin-NG}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {706--719}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_40}, doi = {10.1007/978-3-319-93638-3\_40}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YinWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Willy Susilo and Guomin Yang}, title = {Lattice-Based Universal Accumulator with Nonmembership Arguments}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {502--519}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_29}, doi = {10.1007/978-3-319-93638-3\_29}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZengLYXW18, author = {Yali Zeng and Xu Li and Xu Yang and Qikui Xu and Dongcheng Wang}, editor = {Willy Susilo and Guomin Yang}, title = {A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {634--648}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_36}, doi = {10.1007/978-3-319-93638-3\_36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZengLYXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLLLG18, author = {Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang Liu and Dawu Gu}, editor = {Willy Susilo and Guomin Yang}, title = {Z-Channel: Scalable and Efficient Scheme in Zerocash}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {687--705}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_39}, doi = {10.1007/978-3-319-93638-3\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLLLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZLLXL18, author = {Daode Zhang and Kai Zhang and Bao Li and Xianhui Lu and Haiyang Xue and Jie Li}, editor = {Willy Susilo and Guomin Yang}, title = {Lattice-Based Dual Receiver Encryption and More}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {520--538}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_30}, doi = {10.1007/978-3-319-93638-3\_30}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZLLXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengWQZHL18, author = {Haibin Zheng and Qianhong Wu and Bo Qin and Lin Zhong and Shuangyu He and Jianwei Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Linkable Group Signature for Auditing Anonymous Communication}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {304--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_18}, doi = {10.1007/978-3-319-93638-3\_18}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhengWQZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhongWQZL18, author = {Lin Zhong and Qianhong Wu and Bo Qin and Haibin Zheng and Jianwei Liu}, editor = {Willy Susilo and Guomin Yang}, title = {Auditable Hierarchy-Private Public-Key Encryption}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {322--340}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_19}, doi = {10.1007/978-3-319-93638-3\_19}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhongWQZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZouDL018, author = {Deqing Zou and Zhijun Deng and Zhen Li and Hai Jin}, editor = {Willy Susilo and Guomin Yang}, title = {Automatically Identifying Security Bug Reports via Multitype Features Analysis}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {619--633}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_35}, doi = {10.1007/978-3-319-93638-3\_35}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZouDL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2018, editor = {Willy Susilo and Guomin Yang}, title = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3}, doi = {10.1007/978-3-319-93638-3}, isbn = {978-3-319-93637-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/0002T17, author = {Eunkyung Kim and Mehdi Tibouchi}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Secure {GLS} Recomposition for Sum-of-Square Cofactors}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {349--365}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_20}, doi = {10.1007/978-3-319-59870-3\_20}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/0002T17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AkterH17, author = {Mousumi Akter and Tanzima Hashem}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {249--260}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_14}, doi = {10.1007/978-3-319-59870-3\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AkterH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AvoineCKT17, author = {Gildas Avoine and Xavier Carpent and Barbara Kordy and Florent Tardif}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {How to Handle Rainbow Tables with External Memory}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {306--323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_16}, doi = {10.1007/978-3-319-60055-0\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AvoineCKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17, author = {Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {437--452}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_23}, doi = {10.1007/978-3-319-60055-0\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BeckCDKPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BuldasGB17, author = {Ahto Buldas and Matthias Geihs and Johannes Buchmann}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Long-Term Secure Commitments via Extractable-Binding Commitments}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {65--81}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_4}, doi = {10.1007/978-3-319-60055-0\_4}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BuldasGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChakrabortyPR17, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Efficient Compilers for After-the-Fact Leakage: From {CPA} to {CCA-2} Secure {PKE} to {AKE}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {343--362}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_18}, doi = {10.1007/978-3-319-60055-0\_18}, timestamp = {Sun, 17 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChakrabortyPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChowSTZ17, author = {Yang{-}Wai Chow and Willy Susilo and Joseph Tonien and Wei Zong}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {A {QR} Code Watermarking Approach Based on the {DWT-DCT} Technique}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {314--331}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_18}, doi = {10.1007/978-3-319-59870-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChowSTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiAGR17, author = {Shujie Cui and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Secure and Practical Searchable Encryption: {A} Position Paper}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {266--281}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_14}, doi = {10.1007/978-3-319-60055-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiAGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiDLL17, author = {Hui Cui and Robert H. Deng and Joseph K. Liu and Yingjiu Li}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Attribute-Based Encryption with Expressive and Authorized Keyword Search}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {106--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_6}, doi = {10.1007/978-3-319-60055-0\_6}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiDLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiSCW17, author = {Tingting Cui and Ling Sun and Huaifeng Chen and Meiqin Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Statistical Integral Distinguisher with Multi-structure and Its Application on {AES}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {402--420}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_21}, doi = {10.1007/978-3-319-60055-0\_21}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiSCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DavidsonC17, author = {Alex Davidson and Carlos Cid}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {An Efficient Toolkit for Computing Private Set Operations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {261--278}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_15}, doi = {10.1007/978-3-319-59870-3\_15}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DavidsonC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DumasZ17, author = {Jean{-}Guillaume Dumas and Vincent Zucca}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {115--134}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_7}, doi = {10.1007/978-3-319-59870-3\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DumasZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Emura17, author = {Keita Emura}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {193--213}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_11}, doi = {10.1007/978-3-319-59870-3\_11}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Emura17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ErwigFHHKKKLR17, author = {Andreas Erwig and Marc Fischlin and Martin Hald and Dominik Helm and Robert Kiel and Florian K{\"{u}}bler and Michael K{\"{u}}mmerlin and Jakob Laenge and Felix Rohrbach}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Redactable Graph Hashing, Revisited - (Extended Abstract)}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {398--405}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_24}, doi = {10.1007/978-3-319-59870-3\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ErwigFHHKKKLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FangYTLLWY17, author = {Ying Fang and Bo Yu and Yong Tang and Liu Liu and Zexin Lu and Yi Wang and Qiang Yang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {A New Malware Classification Approach Based on Malware Dynamic Analysis}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {173--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_10}, doi = {10.1007/978-3-319-59870-3\_10}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FangYTLLWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FarashahiH17, author = {Reza Rezaeian Farashahi and Seyed Gholamhossein Hosseini}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Differential Addition on Twisted Edwards Curves}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {366--378}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_21}, doi = {10.1007/978-3-319-59870-3\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FarashahiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ForlerLLW17, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Reforgeability of Authenticated Encryption Schemes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {19--37}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_2}, doi = {10.1007/978-3-319-59870-3\_2}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ForlerLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FunabikiTIM17, author = {Yuki Funabiki and Yosuke Todo and Takanori Isobe and Masakatu Morii}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Improved Integral Attack on {HIGHT}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {363--383}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_19}, doi = {10.1007/978-3-319-60055-0\_19}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FunabikiTIM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanL17, author = {Shuai Han and Shengli Liu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {KDM-Secure Public-Key Encryption from Constant-Noise {LPN}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {44--64}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_3}, doi = {10.1007/978-3-319-60055-0\_3}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HattoriHMSW17, author = {Mitsuhiro Hattori and Takato Hirano and Nori Matsuda and Rina Shimizu and Ye Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {214--234}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_12}, doi = {10.1007/978-3-319-59870-3\_12}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HattoriHMSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HeJLLJ17, author = {Jingnan He and Wenpan Jing and Bao Li and Xianhui Lu and Dingding Jia}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Dual-Mode Cryptosystem Based on the Learning with Errors Problem}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {443--451}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_29}, doi = {10.1007/978-3-319-59870-3\_29}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HeJLLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HorneN17, author = {Dwight Horne and Suku Nair}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {422--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_27}, doi = {10.1007/978-3-319-59870-3\_27}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HorneN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Horsch0MB17, author = {Moritz Horsch and Johannes Braun and Dominique Metz and Johannes Buchmann}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Update-Tolerant and Revocable Password Backup}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {390--397}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_23}, doi = {10.1007/978-3-319-59870-3\_23}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Horsch0MB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangZC17, author = {Fan Jiang and Cen Zhang and Shaoyin Cheng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {61--79}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_4}, doi = {10.1007/978-3-319-59870-3\_4}, timestamp = {Tue, 21 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KermanshahiLS17, author = {Shabnam Kasra Kermanshahi and Joseph K. Liu and Ron Steinfeld}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Multi-user Cloud-Based Secure Keyword Search}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {227--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_12}, doi = {10.1007/978-3-319-60055-0\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KermanshahiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LinTG17, author = {Yan Lin and Xiaoxiao Tang and Debin Gao}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {SafeStack + : Enhanced Dual Stack to Combat Data-Flow Hijacking}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {95--112}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_6}, doi = {10.1007/978-3-319-59870-3\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LinTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MahriSBDW17, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fault Attacks on {XEX} Mode with Application to Certain Authenticated Encryption Modes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {285--305}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_15}, doi = {10.1007/978-3-319-60055-0\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MahriSBDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaitiGC17, author = {Swapan Maiti and Shamit Ghosh and Dipanwita Roy Chowdhury}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {On the Security of Designing a Cellular Automata Based Stream Cipher}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {406--413}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_25}, doi = {10.1007/978-3-319-59870-3\_25}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaitiGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MengHAL17, author = {Weizhi Meng and Lee Wang Hao and Man Ho Au and Zhe Liu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Exploring Effect of Location Number on Map-Based Graphical Password Authentication}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {301--313}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_17}, doi = {10.1007/978-3-319-59870-3\_17}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MengHAL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Naito17, author = {Yusuke Naito}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {38--57}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_3}, doi = {10.1007/978-3-319-59870-3\_3}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Naito17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PrabowoT17, author = {Theo Fanuela Prabowo and Chik How Tan}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Generating Complete Edwards Curves}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {335--348}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_19}, doi = {10.1007/978-3-319-59870-3\_19}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PrabowoT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QiangGJL17, author = {Weizhong Qiang and JiaZhen Guo and Hai Jin and Weifeng Li}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {JSFfox: Run-Timely Confining JavaScript for Firefox}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {135--150}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_8}, doi = {10.1007/978-3-319-59870-3\_8}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QiangGJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QiangHZJWS17, author = {Weizhong Qiang and Yingda Huang and Deqing Zou and Hai Jin and Shizhen Wang and Guozhong Sun}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fully Context-Sensitive {CFI} for {COTS} Binaries}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {435--442}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_28}, doi = {10.1007/978-3-319-59870-3\_28}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QiangHZJWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RodofileSSDRF17, author = {Nicholas R. Rodofile and Thomas Schmidt and Sebastian T. Sherry and Christopher Djamaludin and Kenneth Radke and Ernest Foo}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {452--459}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_30}, doi = {10.1007/978-3-319-59870-3\_30}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RodofileSSDRF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SarkarS17, author = {Sumanta Sarkar and Habeeb Syed}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Analysis of Toeplitz {MDS} Matrices}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_1}, doi = {10.1007/978-3-319-59870-3\_1}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SarkarS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SinghSR17, author = {Abhishek Singh and Binanda Sengupta and Sushmita Ruj}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Certificate Transparency with Enhancements and Short Proofs}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {381--389}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_22}, doi = {10.1007/978-3-319-59870-3\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SinghSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunSWCLH17, author = {Hao Sun and Jinshu Su and Xiaofeng Wang and Rongmao Chen and Yujing Liu and Qiaolin Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {153--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_9}, doi = {10.1007/978-3-319-59870-3\_9}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Takashima17, author = {Katsuyuki Takashima}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {85--105}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_5}, doi = {10.1007/978-3-319-60055-0\_5}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Takashima17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Takayasu017, author = {Atsushi Takayasu and Yohei Watanabe}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {184--204}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_10}, doi = {10.1007/978-3-319-60055-0\_10}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Takayasu017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ThomborsonJ17, author = {Clark D. Thomborson and Marc Jeanmougin}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Stegogames}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {414--421}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_26}, doi = {10.1007/978-3-319-59870-3\_26}, timestamp = {Wed, 26 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ThomborsonJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TianZYMY17, author = {Yangguang Tian and Shiwei Zhang and Guomin Yang and Yi Mu and Yong Yu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Privacy-Preserving k-time Authenticated Secret Handshakes}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {281--300}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_16}, doi = {10.1007/978-3-319-59870-3\_16}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TianZYMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TjuawinataHW17, author = {Ivan Tjuawinata and Tao Huang and Hongjun Wu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Cryptanalysis of Simpira v2}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {384--401}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_20}, doi = {10.1007/978-3-319-60055-0\_20}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TjuawinataHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WatanabeIM17, author = {Yuhei Watanabe and Takanori Isobe and Masakatu Morii}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Conditional Differential Cryptanalysis for Kreyvium}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {421--434}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_22}, doi = {10.1007/978-3-319-60055-0\_22}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WatanabeIM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiWZY17, author = {Puwen Wei and Wei Wang and Bingxin Zhu and Siu{-}Ming Yiu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {3--22}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_1}, doi = {10.1007/978-3-319-60055-0\_1}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiWZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuMMZ17, author = {Tong Wu and Sha Ma and Yi Mu and Shengke Zeng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {ID-Based Encryption with Equality Test Against Insider Attack}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {168--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_9}, doi = {10.1007/978-3-319-60055-0\_9}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuMMZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuL0SWJ17, author = {Peng Xu and Shuai Liang and Wei Wang and Willy Susilo and Qianhong Wu and Hai Jin}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {207--226}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_11}, doi = {10.1007/978-3-319-60055-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuL0SWJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuYMS17, author = {Shengmin Xu and Guomin Yang and Yi Mu and Willy Susilo}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Mergeable and Revocable Identity-Based Encryption}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {147--167}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_8}, doi = {10.1007/978-3-319-60055-0\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuYMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangLWH17, author = {Yanjiang Yang and Joseph K. Liu and Zhuo Wei and Xinyi Huang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {127--144}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_7}, doi = {10.1007/978-3-319-60055-0\_7}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangLWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YingK17, author = {Jason H. M. Ying and Noboru Kunihiro}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Solving the {DLP} with Low Hamming Weight Product Exponents and Improved Attacks on the {GPS} Identification Scheme}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {460--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_31}, doi = {10.1007/978-3-319-59870-3\_31}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YingK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhanZGWN17, author = {Jiawei Zhan and Quan Zhou and Xiaozhuo Gu and Yuewu Wang and Yingjiao Niu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Splitting Third-Party Libraries' Privileges from Android Apps}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {80--94}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_5}, doi = {10.1007/978-3-319-59870-3\_5}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhanZGWN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLG17, author = {Xiao Zhang and Shengli Liu and Dawu Gu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {453--468}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_24}, doi = {10.1007/978-3-319-60055-0\_24}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangMYW17, author = {Shiwei Zhang and Yi Mu and Guomin Yang and Xiaofen Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Hierarchical Functional Encryption for Linear Transformations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {23--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_2}, doi = {10.1007/978-3-319-60055-0\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengKH17, author = {Mengce Zheng and Noboru Kunihiro and Honggang Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Improved Factoring Attacks on Multi-prime {RSA} with Small Prime Difference}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {324--342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_17}, doi = {10.1007/978-3-319-60055-0\_17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhengKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhouXLXP17, author = {Fucai Zhou and Zifeng Xu and Yuxi Li and Jian Xu and Su Peng}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Private Graph Intersection Protocol}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {235--248}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_13}, doi = {10.1007/978-3-319-59870-3\_13}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhouXLXP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuMWLC17, author = {Hong Zhu and Zhuolin Mei and Bing Wu and Hongbo Li and Zongmin Cui}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {248--265}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_13}, doi = {10.1007/978-3-319-60055-0\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhuMWLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2017-1, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0}, doi = {10.1007/978-3-319-60055-0}, isbn = {978-3-319-60054-3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2017-2, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3}, doi = {10.1007/978-3-319-59870-3}, isbn = {978-3-319-59869-7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/0008WLHT16, author = {Wei Yu and Kunpeng Wang and Bao Li and Xiaoyang He and Song Tian}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Deterministic Encoding into Twisted Edwards Curves}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {285--297}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_18}, doi = {10.1007/978-3-319-40367-0\_18}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/0008WLHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BagheriMS16, author = {Nasour Bagheri and Florian Mendel and Yu Sasaki}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate {PAEQ}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {301--316}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_19}, doi = {10.1007/978-3-319-40367-0\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BagheriMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydC16, author = {Colin Boyd and Christopher Carr}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Fair Client Puzzles from the Bitcoin Blockchain}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {161--177}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_10}, doi = {10.1007/978-3-319-40253-6\_10}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BunderNST16, author = {Martin W. Bunder and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A New Attack on Three Variants of the {RSA} Cryptosystem}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {258--268}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_16}, doi = {10.1007/978-3-319-40367-0\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BunderNST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CastiglioneSMPC16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {37--54}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_3}, doi = {10.1007/978-3-319-40367-0\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CastiglioneSMPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenLYXAT16, author = {Wei Chen and Xiapu Luo and Chengyu Yin and Bin Xiao and Man Ho Au and Yajuan Tang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {{MUSE:} Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {20--39}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_2}, doi = {10.1007/978-3-319-40253-6\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenLYXAT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16, author = {Rongmao Chen and Yi Mu and Willy Susilo and Guomin Yang and Fuchun Guo and Mingwu Zhang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {One-Round Strong Oblivious Signature-Based Envelope}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {3--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_1}, doi = {10.1007/978-3-319-40367-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenTSSF16, author = {Jiageng Chen and Jesen Teh and Chunhua Su and Azman Samsudin and Junbin Fang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved (related-key) Attacks on Round-Reduced {KATAN-32/48/64} Based on the Extended Boomerang Framework}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {333--346}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_21}, doi = {10.1007/978-3-319-40367-0\_21}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenTSSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChengLD16, author = {Yao Cheng and Yingjiu Li and Robert H. Deng}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Feasible No-Root Approach on Android}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {481--489}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_32}, doi = {10.1007/978-3-319-40367-0\_32}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChengLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChowSYPPB16, author = {Yang{-}Wai Chow and Willy Susilo and Guomin Yang and James G. Phillips and Ilung Pranata and Ari Moesriami Barmawi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Exploiting the Error Correction Mechanism in {QR} Codes for Secret Sharing}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {409--425}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_25}, doi = {10.1007/978-3-319-40253-6\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChowSYPPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuongPT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Reducing the Key Size of the {SRP} Encryption Scheme}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {427--434}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_27}, doi = {10.1007/978-3-319-40367-0\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuongPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuttaNP16, author = {Avijit Dutta and Mridul Nandi and Goutam Paul}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {One-Key Compression Function Based {MAC} with Security Beyond Birthday Bound}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {343--358}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_21}, doi = {10.1007/978-3-319-40253-6\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuttaNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ForlerLLW16, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {317--332}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_20}, doi = {10.1007/978-3-319-40367-0\_20}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ForlerLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GlennanLE16, author = {Timothy Glennan and Christopher Leckie and Sarah M. Erfani}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {493--501}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_33}, doi = {10.1007/978-3-319-40367-0\_33}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GlennanLE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GosmanCDPC16, author = {Catalin Gosman and Tudor Cornea and Ciprian Dobre and Florin Pop and Aniello Castiglione}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Putting the User in Control of the Intelligent Transportation System}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {231--246}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_14}, doi = {10.1007/978-3-319-40253-6\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GosmanCDPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HeWAMD16, author = {Kai He and Jian Weng and Man Ho Au and Yijun Mao and Robert H. Deng}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {207--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_13}, doi = {10.1007/978-3-319-40367-0\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HeWAMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HorschS0B16, author = {Moritz Horsch and Mario Schlipf and Johannes Braun and Johannes Buchmann}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Password Requirements Markup Language}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {426--439}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_26}, doi = {10.1007/978-3-319-40253-6\_26}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HorschS0B16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HouLL16, author = {Lin Hou and Junzuo Lai and Lixian Liu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Secret Handshakes with Dynamic Expressive Matching Policy}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {461--476}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_28}, doi = {10.1007/978-3-319-40253-6\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HouLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiaW16, author = {Keting Jia and Ning Wang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Impossible Differential Cryptanalysis of 14-Round Camellia-192}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {363--378}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_23}, doi = {10.1007/978-3-319-40367-0\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangCWMSL16, author = {Tao Jiang and Xiaofeng Chen and Qianhong Wu and Jianfeng Ma and Willy Susilo and Wenjing Lou}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Towards Efficient Fully Randomized Message-Locked Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {361--375}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_22}, doi = {10.1007/978-3-319-40253-6\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangCWMSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangMGW16, author = {Peng Jiang and Yi Mu and Fuchun Guo and Qiaoyan Wen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Public Key Encryption with Authorized Keyword Search}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {170--186}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_11}, doi = {10.1007/978-3-319-40367-0\_11}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangMGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangSMG16, author = {Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun Guo}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {477--494}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_29}, doi = {10.1007/978-3-319-40253-6\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangSMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KutylowskiHK16, author = {Miroslaw Kutylowski and Lucjan Hanzlik and Kamil Kluczniak}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {467--477}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_31}, doi = {10.1007/978-3-319-40367-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KutylowskiHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiMGSC16, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Willy Susilo and Rongmao Chen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {223--239}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_14}, doi = {10.1007/978-3-319-40367-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiMGSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeMLLGY16, author = {Min Cherng Lee and Robin Mitra and Emmanuel Lazaridis and An Chow Lai and Yong Kheng Goh and Wun{-}She Yap}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {77--93}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_5}, doi = {10.1007/978-3-319-40253-6\_5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LeeMLLGY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLLJJL16, author = {Tong Li and Zheli Liu and Ping Li and Chunfu Jia and Zoe Lin Jiang and Jin Li}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {153--169}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_10}, doi = {10.1007/978-3-319-40367-0\_10}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiLLJJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiW16, author = {Zhen Li and Wei Wu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Reversible Data Hiding for Encrypted Images Based on Statistical Learning}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {198--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_12}, doi = {10.1007/978-3-319-40253-6\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiangMS16, author = {Kaitai Liang and Atsuko Miyaji and Chunhua Su}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Secure and Traceable Framework for Data Circulation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {376--388}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_23}, doi = {10.1007/978-3-319-40253-6\_23}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiangMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LinL16, author = {Xiaodong Lin and Rongxing Lu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Proxy Re-encryption with Delegatable Verifiability}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {120--133}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_8}, doi = {10.1007/978-3-319-40367-0\_8}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LinL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuGLX16, author = {Zhe Liu and Johann Gro{\ss}sch{\"{a}}dl and Lin Li and Qiuliang Xu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {94--112}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_6}, doi = {10.1007/978-3-319-40253-6\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuGLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuWCX16, author = {Shigang Liu and Yu Wang and Chao Chen and Yang Xiang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {215--228}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_13}, doi = {10.1007/978-3-319-40253-6\_13}, timestamp = {Fri, 26 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuWCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lu16, author = {Jiqiang Lu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {On the Security of the {LAC} Authenticated Encryption Algorithm}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {395--408}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_25}, doi = {10.1007/978-3-319-40367-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuoRLHLWXW16, author = {Xiling Luo and Yili Ren and Jingwen Liu and Jiankun Hu and Weiran Liu and Zhen Wang and Wei Xu and Qianhong Wu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Identity-Based Group Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {87--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_6}, doi = {10.1007/978-3-319-40367-0\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuoRLHLWXW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/McCorryMSH16, author = {Patrick McCorry and Malte M{\"{o}}ser and Siamak Fayyaz Shahandashti and Feng Hao}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Towards Bitcoin Payment Networks}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {57--76}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_4}, doi = {10.1007/978-3-319-40253-6\_4}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/McCorryMSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Minematsu16, author = {Kazuhiko Minematsu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Authenticated Encryption with Small Stretch (or, How to Accelerate {AERO)}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {347--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_22}, doi = {10.1007/978-3-319-40367-0\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Minematsu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NisbetW16, author = {Alastair Nisbet and Andrew Woodward}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {115--127}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_7}, doi = {10.1007/978-3-319-40253-6\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NisbetW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanYZ16, author = {Shiran Pan and Shen Yan and Wen Tao Zhu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {446--453}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_29}, doi = {10.1007/978-3-319-40367-0\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PangYO16, author = {Ying{-}Han Pang and Khor Ean Yee and Shih Yin Ooi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Biometric Access Control with High Dimensional Facial Features}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {437--445}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_28}, doi = {10.1007/978-3-319-40367-0\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PangYO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ParraCH16, author = {Jhordany Rodriguez Parra and Terence Chan and Siu{-}Wai Ho}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Noiseless Key-Homomorphic {PRF:} Application on Distributed Storage Systems}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {505--513}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_34}, doi = {10.1007/978-3-319-40367-0\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ParraCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhuongYSL16, author = {Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo and Kaitai Liang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Edit Distance Based Encryption and Its Application}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {103--119}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_7}, doi = {10.1007/978-3-319-40367-0\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhuongYSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QinCW16, author = {Lingyue Qin and Huaifeng Chen and Xiaoyun Wang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {409--424}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_26}, doi = {10.1007/978-3-319-40367-0\_26}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/QinCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Rudolph16, author = {Carsten Rudolph}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Exploring the Space of Digital Evidence - Position Paper}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {249--262}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_15}, doi = {10.1007/978-3-319-40253-6\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Rudolph16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SongHY16, author = {Ling Song and Zhangjie Huang and Qianqian Yang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Automatic Differential Analysis of {ARX} Block Ciphers with Application to {SPECK} and {LEA}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {379--394}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_24}, doi = {10.1007/978-3-319-40367-0\_24}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SongHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SongKH16, author = {Youngbae Song and Hyoungshick Kim and Jun Ho Huh}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {On the Guessability of Resident Registration Numbers in South Korea}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {128--138}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_8}, doi = {10.1007/978-3-319-40253-6\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SongKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunPYYG16, author = {Shifeng Sun and Udaya Parampalli and Tsz Hon Yuen and Yu Yu and Dawu Gu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Efficient Completely Non-Malleable and {RKA} Secure Public Key Encryptions}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {134--150}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_9}, doi = {10.1007/978-3-319-40367-0\_9}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunPYYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWLLHQH16, author = {Yang Sun and Qianhong Wu and Jingwen Liu and Jianwei Liu and Xinyi Huang and Bo Qin and Wei Hu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Accelerating Oblivious Transfer with Batch Multi-exponentiation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {310--326}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_19}, doi = {10.1007/978-3-319-40253-6\_19}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWLLHQH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunYLZQZ16, author = {Yujuan Sun and Yu Yu and Xiangxue Li and Kai Zhang and Haifeng Qian and Yuan Zhou}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {293--309}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_18}, doi = {10.1007/978-3-319-40253-6\_18}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SunYLZQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Partial Key Exposure Attacks on {RSA} with Multiple Exponent Pairs}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {243--257}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_15}, doi = {10.1007/978-3-319-40367-0\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TangLS16, author = {Shaohua Tang and Bo Lv and Wuqiang Shen}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Hybrid {MQ} Signature for Embedded Device}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {281--290}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_17}, doi = {10.1007/978-3-319-40253-6\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TangLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangHYCWF16, author = {Jingxuan Wang and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Xingmin Cui and Eric Ke Wang and Jun{-}bin Fang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {40--56}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_3}, doi = {10.1007/978-3-319-40253-6\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangHYCWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangM16, author = {Xiaofen Wang and Yi Mu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Content-Based Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {57--72}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_4}, doi = {10.1007/978-3-319-40367-0\_4}, timestamp = {Mon, 24 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaYXH16, author = {Zhe Xia and Xiaoyun Yang and Min Xiao and Debiao He}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {73--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_5}, doi = {10.1007/978-3-319-40367-0\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XiaYXH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuMYZT16, author = {Rui Xu and Kirill Morozov and Yanjiang Yang and Jianying Zhou and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {181--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_11}, doi = {10.1007/978-3-319-40253-6\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuMYZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuYMM16, author = {Shengmin Xu and Guomin Yang and Yi Mu and Sha Ma}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Proxy Signature with Revocation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {21--36}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_2}, doi = {10.1007/978-3-319-40367-0\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/XuYMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamakawaHK16, author = {Takashi Yamakawa and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {269--284}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_17}, doi = {10.1007/978-3-319-40367-0\_17}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamakawaHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YanPZZ16, author = {Shen Yan and Shiran Pan and Yuhang Zhao and Wen Tao Zhu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {141--157}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_9}, doi = {10.1007/978-3-319-40253-6\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YanPZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangCWLC16, author = {Yanjiang Yang and Haibin Cai and Zhuo Wei and Haibing Lu and Kim{-}Kwang Raymond Choo}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Towards Lightweight Anonymous Entity Authentication for IoT Applications}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {265--280}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_16}, doi = {10.1007/978-3-319-40253-6\_16}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangCWLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangXC16, author = {Min Yang and Fei Xu and Kam{-}Pui Chow}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Interest Profiling for Security Monitoring and Forensic Investigation}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {457--464}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_30}, doi = {10.1007/978-3-319-40367-0\_30}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YangXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YiYFHS16, author = {Xun Yi and Xuechao Yang and Yong Feng and Fengling Han and Ron G. van Schyndel}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {CTM-sp: {A} Family of Cryptographic Hash Functions from Chaotic Tent Maps}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {329--342}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_20}, doi = {10.1007/978-3-319-40253-6\_20}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YiYFHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuAXYH16, author = {Zuoxia Yu and Man Ho Au and Qiuliang Xu and Rupeng Yang and Jinguang Han}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Leakage-Resilient Functional Encryption via Pair Encodings}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {443--460}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_27}, doi = {10.1007/978-3-319-40253-6\_27}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuAXYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuLASCZ16, author = {Yong Yu and Yannan Li and Man Ho Au and Willy Susilo and Kim{-}Kwang Raymond Choo and Xinpeng Zhang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {389--405}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_24}, doi = {10.1007/978-3-319-40253-6\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YuLASCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangCLWW16, author = {Peng Zhang and Zehong Chen and Kaitai Liang and Shulan Wang and Ting Wang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {A Cloud-Based Access Control Scheme with User Revocation and Attribute Update}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {525--540}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_32}, doi = {10.1007/978-3-319-40253-6\_32}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangCLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLZ0016, author = {Yinghui Zhang and Jin Li and Dong Zheng and Xiaofeng Chen and Hui Li}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {509--524}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_31}, doi = {10.1007/978-3-319-40253-6\_31}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLZ0016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangYM16, author = {Shiwei Zhang and Guomin Yang and Yi Mu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Linear Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {187--203}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_12}, doi = {10.1007/978-3-319-40367-0\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhaoLBMZQA16, author = {Shuang Zhao and Xiapu Luo and Bo Bai and Xiaobo Ma and Wei Zou and Xinliang Qiu and Man Ho Au}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {3--19}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_1}, doi = {10.1007/978-3-319-40253-6\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhaoLBMZQA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZuoSWXJ16, author = {Cong Zuo and Jun Shao and Guiyi Wei and Mande Xie and Min Ji}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {495--508}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_30}, doi = {10.1007/978-3-319-40253-6\_30}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZuoSWXJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2016-1, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6}, doi = {10.1007/978-3-319-40253-6}, isbn = {978-3-319-40252-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2016-2, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0}, doi = {10.1007/978-3-319-40367-0}, isbn = {978-3-319-40366-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AgrawalCS15, author = {Megha Agrawal and Donghoon Chang and Somitra Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {451--468}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_26}, doi = {10.1007/978-3-319-19962-7\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AgrawalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlissaRDS15, author = {Khalid Alissa and Jason Reid and Ed Dawson and Farzad Salim}, editor = {Ernest Foo and Douglas Stebila}, title = {{BP-XACML} an Authorisation Policy Language for Business Processes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {307--325}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_18}, doi = {10.1007/978-3-319-19962-7\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AlissaRDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AvoineBC15, author = {Gildas Avoine and Adrien Bourgeois and Xavier Carpent}, editor = {Ernest Foo and Douglas Stebila}, title = {Analysis of Rainbow Tables with Fingerprints}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {356--374}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_21}, doi = {10.1007/978-3-319-19962-7\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AvoineBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length Message}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {93--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_6}, doi = {10.1007/978-3-319-19962-7\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BernsteinHLN15, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen}, editor = {Ernest Foo and Douglas Stebila}, title = {Bad Directions in Cryptographic Hash Functions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {488--508}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_28}, doi = {10.1007/978-3-319-19962-7\_28}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BernsteinHLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bose0R15, author = {Priyanka Bose and Dipanjan Das and Chandrasekaran Pandu Rangan}, editor = {Ernest Foo and Douglas Stebila}, title = {Constant Size Ring Signature Without Random Oracle}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {230--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_14}, doi = {10.1007/978-3-319-19962-7\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Bose0R15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMYGW15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, editor = {Ernest Foo and Douglas Stebila}, title = {A New General Framework for Secure Public Key Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {59--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_4}, doi = {10.1007/978-3-319-19962-7\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DattaY15, author = {Nilanjan Datta and Kan Yasuda}, editor = {Ernest Foo and Douglas Stebila}, title = {Generalizing {PMAC} Under Weaker Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {433--450}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_25}, doi = {10.1007/978-3-319-19962-7\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DattaY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DowlingS15, author = {Benjamin Dowling and Douglas Stebila}, editor = {Ernest Foo and Douglas Stebila}, title = {Modelling Ciphersuite and Version Negotiation in the {TLS} Protocol}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {270--288}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_16}, doi = {10.1007/978-3-319-19962-7\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DowlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EgertFGJST15, author = {Rolf Egert and Marc Fischlin and David Gens and Sven Jacob and Matthias Senker and J{\"{o}}rn Tillmanns}, editor = {Ernest Foo and Douglas Stebila}, title = {Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {413--430}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_24}, doi = {10.1007/978-3-319-19962-7\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EgertFGJST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FengMYL15, author = {Yiteng Feng and Yi Mu and Guomin Yang and Joseph K. Liu}, editor = {Ernest Foo and Douglas Stebila}, title = {A New Public Remote Integrity Checking Scheme with User Privacy}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {377--394}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_22}, doi = {10.1007/978-3-319-19962-7\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FengMYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhoshSSC15, author = {Shamit Ghosh and Dhiman Saha and Abhrajit Sengupta and Dipanwita Roy Chowdhury}, editor = {Ernest Foo and Douglas Stebila}, title = {Preventing Fault Attacks Using Fault Randomization with a Case Study on {AES}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {343--355}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_20}, doi = {10.1007/978-3-319-19962-7\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GrittiSP15, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard}, editor = {Ernest Foo and Douglas Stebila}, title = {Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {395--412}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_23}, doi = {10.1007/978-3-319-19962-7\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GrittiSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuntherP15, author = {Felix G{\"{u}}nther and Bertram Poettering}, editor = {Ernest Foo and Douglas Stebila}, title = {Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {195--212}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_12}, doi = {10.1007/978-3-319-19962-7\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuntherP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshidaWS15, author = {Yuu Ishida and Yohei Watanabe and Junji Shikata}, editor = {Ernest Foo and Douglas Stebila}, title = {Constructions of CCA-Secure Revocable Identity-Based Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {174--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_11}, doi = {10.1007/978-3-319-19962-7\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshidaWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ItoM15, author = {Ryoma Ito and Atsuko Miyaji}, editor = {Ernest Foo and Douglas Stebila}, title = {How {TKIP} Induces Biases of Internal States of Generic {RC4}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {329--342}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_19}, doi = {10.1007/978-3-319-19962-7\_19}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ItoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaP15, author = {Kaoru Kurosawa and Le Trieu Phong}, editor = {Ernest Foo and Douglas Stebila}, title = {{IBE} Under k k -LIN with Shorter Ciphertexts and Private Keys}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {145--159}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_9}, doi = {10.1007/978-3-319-19962-7\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiMGS15, author = {Jianchang Lai and Yi Mu and Fuchun Guo and Willy Susilo}, editor = {Ernest Foo and Douglas Stebila}, title = {Improved Identity-Based Online/Offline Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {160--173}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_10}, doi = {10.1007/978-3-319-19962-7\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiMGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaLHL15, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, editor = {Ernest Foo and Douglas Stebila}, title = {Cryptanalysis of Reduced-Round Whirlwind}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {20--38}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_2}, doi = {10.1007/978-3-319-19962-7\_2}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NegreP15, author = {Christophe N{\`{e}}gre and Guilherme Perin}, editor = {Ernest Foo and Douglas Stebila}, title = {Trade-Off Approaches for Leak Resistant Modular Arithmetic in {RNS}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {107--124}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_7}, doi = {10.1007/978-3-319-19962-7\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NegreP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakaiESHO15, author = {Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt and Goichiro Hanaoka and Kazuo Ohta}, editor = {Ernest Foo and Douglas Stebila}, title = {Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {77--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_5}, doi = {10.1007/978-3-319-19962-7\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWZ15, author = {Zhelei Sun and Peng Wang and Liting Zhang}, editor = {Ernest Foo and Douglas Stebila}, title = {Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_1}, doi = {10.1007/978-3-319-19962-7\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Tang15, author = {Qiang Tang}, editor = {Ernest Foo and Douglas Stebila}, title = {Towards Forward Security Properties for {PEKS} and {IBE}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {127--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_8}, doi = {10.1007/978-3-319-19962-7\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Tang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TaoW15, author = {Biaoshuai Tao and Hongjun Wu}, editor = {Ernest Foo and Douglas Stebila}, title = {Improving the Biclique Cryptanalysis of {AES}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {39--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_3}, doi = {10.1007/978-3-319-19962-7\_3}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TaoW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TrethowenAMW15, author = {Leliel Trethowen and Craig Anslow and Stuart Marshall and Ian Welch}, editor = {Ernest Foo and Douglas Stebila}, title = {VisRAID: Visualizing Remote Access for Intrusion Detection}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {289--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_17}, doi = {10.1007/978-3-319-19962-7\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TrethowenAMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT15, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Ernest Foo and Douglas Stebila}, title = {Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {213--229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_13}, doi = {10.1007/978-3-319-19962-7\_13}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YasudaSKYK15, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Ernest Foo and Douglas Stebila}, title = {Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {471--487}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_27}, doi = {10.1007/978-3-319-19962-7\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YasudaSKYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLH15, author = {Tingting Zhang and Hongda Li and Guifang Huang}, editor = {Ernest Foo and Douglas Stebila}, title = {Constant-Round Leakage-Resilient Zero-Knowledge Argument for {NP} from the Knowledge-of-Exponent Assumption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {251--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_15}, doi = {10.1007/978-3-319-19962-7\_15}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2015, editor = {Ernest Foo and Douglas Stebila}, title = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7}, doi = {10.1007/978-3-319-19962-7}, isbn = {978-3-319-19961-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlawatugodaBS14, author = {Janaka Alawatugoda and Colin Boyd and Douglas Stebila}, editor = {Willy Susilo and Yi Mu}, title = {Continuous After-the-Fact Leakage-Resilient Key Exchange}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {258--273}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_17}, doi = {10.1007/978-3-319-08344-5\_17}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AlawatugodaBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlneyadiSM14, author = {Sultan Alneyadi and Elankayer Sithirasenan and Vallipuram Muthukkumarasamy}, editor = {Willy Susilo and Yi Mu}, title = {A Semantics-Aware Classification Approach for Data Leakage Prevention}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {413--421}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_27}, doi = {10.1007/978-3-319-08344-5\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AlneyadiSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiG14, author = {Shi Bai and Steven D. Galbraith}, editor = {Willy Susilo and Yi Mu}, title = {Lattice Decoding Attacks on Binary {LWE}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {322--337}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_21}, doi = {10.1007/978-3-319-08344-5\_21}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Banik14, author = {Subhadeep Banik}, editor = {Willy Susilo and Yi Mu}, title = {Some Insights into Differential Cryptanalysis of Grain v1}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {34--49}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_3}, doi = {10.1007/978-3-319-08344-5\_3}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Banik14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenHZ14, author = {Yu Chen and Qiong Huang and Zongyang Zhang}, editor = {Willy Susilo and Yi Mu}, title = {Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {274--289}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_18}, doi = {10.1007/978-3-319-08344-5\_18}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiYCHYQ14, author = {Xingmin Cui and Da Yu and Patrick P. F. Chan and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Sihan Qing}, editor = {Willy Susilo and Yi Mu}, title = {CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {446--453}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_31}, doi = {10.1007/978-3-319-08344-5\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CuiYCHYQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DattaDM14, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Willy Susilo and Yi Mu}, title = {Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {98--114}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_7}, doi = {10.1007/978-3-319-08344-5\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DattaDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DattaN14, author = {Nilanjan Datta and Mridul Nandi}, editor = {Willy Susilo and Yi Mu}, title = {ELmE: {A} Misuse Resistant Parallel Authenticated Encryption}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {306--321}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_20}, doi = {10.1007/978-3-319-08344-5\_20}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DattaN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DingGSWG14, author = {Zhaojing Ding and Wei Guo and Liangjian Su and Jizeng Wei and Haihua Gu}, editor = {Willy Susilo and Yi Mu}, title = {Further Research on {N-1} Attack against Exponentiation Algorithms}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {162--175}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_11}, doi = {10.1007/978-3-319-08344-5\_11}, timestamp = {Sun, 27 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DingGSWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FukumitsuHIS14, author = {Masayuki Fukumitsu and Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya}, editor = {Willy Susilo and Yi Mu}, title = {On the Impossibility of Proving Security of Strong-RSA Signatures via the {RSA} Assumption}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {290--305}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_19}, doi = {10.1007/978-3-319-08344-5\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FukumitsuHIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KhanM14, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Willy Susilo and Yi Mu}, title = {Another Look at Privacy Threats in 3G Mobile Telephony}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {386--396}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_25}, doi = {10.1007/978-3-319-08344-5\_25}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KhanM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuCL14, author = {Liang Liu and Xiaofeng Chen and Wenjing Lou}, editor = {Willy Susilo and Yi Mu}, title = {A Secure Three-Party Computational Protocol for Triangle Area}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {82--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_6}, doi = {10.1007/978-3-319-08344-5\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLCYJ14, author = {Zheli Liu and Jin Li and Xiaofeng Chen and Jun Yang and Chunfu Jia}, editor = {Willy Susilo and Yi Mu}, title = {{TMDS:} Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {115--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_8}, doi = {10.1007/978-3-319-08344-5\_8}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuLCYJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLWQ14, author = {Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin}, editor = {Willy Susilo and Yi Mu}, title = {Hierarchical Identity-Based Broadcast Encryption}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {242--257}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_16}, doi = {10.1007/978-3-319-08344-5\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuLWQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanD14, author = {Yanbin Pan and Yingpu Deng}, editor = {Willy Susilo and Yi Mu}, title = {A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from {ACISP} 2012}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {148--161}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_10}, doi = {10.1007/978-3-319-08344-5\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RahulamathavanMBSR14, author = {Yogachandran Rahulamathavan and Veelasha Moonsamy and Lynn Margaret Batten and Su Shunliang and Muttukrishnan Rajarajan}, editor = {Willy Susilo and Yi Mu}, title = {An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {430--437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_29}, doi = {10.1007/978-3-319-08344-5\_29}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RahulamathavanMBSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RaoD14, author = {Y. Sreenivasa Rao and Ratna Dutta}, editor = {Willy Susilo and Yi Mu}, title = {Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {209--225}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_14}, doi = {10.1007/978-3-319-08344-5\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RaoD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusilSV14, author = {Petr Susil and Pouyan Sepehrdad and Serge Vaudenay}, editor = {Willy Susilo and Yi Mu}, title = {On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {50--65}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_4}, doi = {10.1007/978-3-319-08344-5\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SusilSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TagaMA14, author = {Bungo Taga and Shiho Moriai and Kazumaro Aoki}, editor = {Willy Susilo and Yi Mu}, title = {Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {17--33}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_2}, doi = {10.1007/978-3-319-08344-5\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TagaMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK14, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Willy Susilo and Yi Mu}, title = {Cryptanalysis of {RSA} with Multiple Small Secret Exponents}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {176--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_12}, doi = {10.1007/978-3-319-08344-5\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/VejreB14, author = {Philip S. Vejre and Andrey Bogdanov}, editor = {Willy Susilo and Yi Mu}, title = {Route 66: Passively Breaking All {GSM} Channels}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {422--429}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_28}, doi = {10.1007/978-3-319-08344-5\_28}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/VejreB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangFQSXC14, author = {Weijin Wang and Dengguo Feng and Yu Qin and Jianxiong Shao and Li Xi and XiaoBo Chu}, editor = {Willy Susilo and Yi Mu}, title = {ExBLACR: Extending {BLACR} System}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {397--412}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_26}, doi = {10.1007/978-3-319-08344-5\_26}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangFQSXC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT14, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Willy Susilo and Yi Mu}, title = {Strongly Simulation-Extractable Leakage-Resilient {NIZK}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {66--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_5}, doi = {10.1007/978-3-319-08344-5\_5}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangW14, author = {Yanfeng Wang and Wenling Wu}, editor = {Willy Susilo and Yi Mu}, title = {Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and {TWINE}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_1}, doi = {10.1007/978-3-319-08344-5\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenW14, author = {Long Wen and Meiqin Wang}, editor = {Willy Susilo and Yi Mu}, title = {Integral Zero-Correlation Distinguisher for {ARX} Block Cipher, with Application to {SHACAL-2}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {454--461}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_32}, doi = {10.1007/978-3-319-08344-5\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamotoSF14, author = {Dan Yamamoto and Hisayoshi Sato and Yasuko Fukuzawa}, editor = {Willy Susilo and Yi Mu}, title = {Incrementally Executable Signcryptions}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {226--241}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_15}, doi = {10.1007/978-3-319-08344-5\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamotoSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YasudaSKYK14, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Willy Susilo and Yi Mu}, title = {Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {338--353}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_22}, doi = {10.1007/978-3-319-08344-5\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YasudaSKYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Zhang14, author = {Mingwu Zhang}, editor = {Willy Susilo and Yi Mu}, title = {New Model and Construction of {ABE:} Achieving Key Resilient-Leakage and Attribute Direct-Revocation}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {192--208}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_13}, doi = {10.1007/978-3-319-08344-5\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLLXJ14, author = {Qinglong Zhang and Zongbin Liu and Miao Li and Ji Xiang and Jiwu Jing}, editor = {Willy Susilo and Yi Mu}, title = {A High-Throughput Unrolled {ZUC} Core for 100Gbps Data Transmission}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {370--385}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_24}, doi = {10.1007/978-3-319-08344-5\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLLXJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangWJWL14, author = {Zhongwen Zhang and Yuewu Wang and Jiwu Jing and Qiongxiao Wang and Lingguang Lei}, editor = {Willy Susilo and Yi Mu}, title = {Once Root Always a Threat: Analyzing the Security Threats of Android Permission System}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {354--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_23}, doi = {10.1007/978-3-319-08344-5\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangWJWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZCS14, author = {Zhijiao Zhang and Lei Zhang and Yu Chen and Yuanchun Shi}, editor = {Willy Susilo and Yi Mu}, title = {Running Multiple Androids on One {ARM} Platform}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {438--445}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_30}, doi = {10.1007/978-3-319-08344-5\_30}, timestamp = {Thu, 10 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhongWZW14, author = {Xiao Zhong and Mingsheng Wang and Bin Zhang and Shengbao Wu}, editor = {Willy Susilo and Yi Mu}, title = {Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {131--147}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_9}, doi = {10.1007/978-3-319-08344-5\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhongWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2014, editor = {Willy Susilo and Yi Mu}, title = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5}, doi = {10.1007/978-3-319-08344-5}, isbn = {978-3-319-08343-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AnadaAHI13, author = {Hiroaki Anada and Seiko Arita and Sari Handa and Yosuke Iwabuchi}, editor = {Colin Boyd and Leonie Simpson}, title = {Attribute-Based Identification: Definitions and Efficient Constructions}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {168--186}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_12}, doi = {10.1007/978-3-642-39059-3\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AnadaAHI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Aono13, author = {Yoshinori Aono}, editor = {Colin Boyd and Leonie Simpson}, title = {Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to {RSA}}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {88--103}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_7}, doi = {10.1007/978-3-642-39059-3\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Aono13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiYWW13, author = {Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang}, editor = {Colin Boyd and Leonie Simpson}, title = {Improved Boomerang Attacks on {SM3}}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {251--266}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_17}, doi = {10.1007/978-3-642-39059-3\_17}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaiYWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BanikMST13, author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar and Meltem S{\"{o}}nmez Turan}, editor = {Colin Boyd and Leonie Simpson}, title = {A Chosen {IV} Related Key Attack on Grain-128a}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {13--26}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_2}, doi = {10.1007/978-3-642-39059-3\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BanikMST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Boyen13, author = {Xavier Boyen}, editor = {Colin Boyd and Leonie Simpson}, title = {Expressive Cryptography: Lattice Perspectives}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {267}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_18}, doi = {10.1007/978-3-642-39059-3\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Boyen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BuldasL13, author = {Ahto Buldas and Risto Laanoja}, editor = {Colin Boyd and Leonie Simpson}, title = {Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {235--250}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_16}, doi = {10.1007/978-3-642-39059-3\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BuldasL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BuldasN13, author = {Ahto Buldas and Margus Niitsoo}, editor = {Colin Boyd and Leonie Simpson}, title = {Black-Box Separations and Their Adaptability to the Non-uniform Model}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {152--167}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_11}, doi = {10.1007/978-3-642-39059-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BuldasN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Camtepe13, author = {Seyit Ahmet {\c{C}}amtepe}, editor = {Colin Boyd and Leonie Simpson}, title = {Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {363--378}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_25}, doi = {10.1007/978-3-642-39059-3\_25}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Camtepe13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FouqueJT13, author = {Pierre{-}Alain Fouque and Antoine Joux and Mehdi Tibouchi}, editor = {Colin Boyd and Leonie Simpson}, title = {Injective Encodings to Elliptic Curves}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {203--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_14}, doi = {10.1007/978-3-642-39059-3\_14}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FouqueJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FukumitsuHIKS13, author = {Masayuki Fukumitsu and Shingo Hasegawa and Shuji Isobe and Eisuke Koizumi and Hiroki Shizuya}, editor = {Colin Boyd and Leonie Simpson}, title = {Toward Separating the Strong Adaptive Pseudo-freeness from the Strong {RSA} Assumption}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {72--87}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_6}, doi = {10.1007/978-3-642-39059-3\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FukumitsuHIKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Ghadafi13, author = {Essam Ghadafi}, editor = {Colin Boyd and Leonie Simpson}, title = {Formalizing Group Blind Signatures and Practical Constructions without Random Oracles}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {330--346}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_23}, doi = {10.1007/978-3-642-39059-3\_23}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Ghadafi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GjosteenPS13, author = {Kristian Gj{\o}steen and George Petrides and Asgeir Steine}, editor = {Colin Boyd and Leonie Simpson}, title = {Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {379--387}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_26}, doi = {10.1007/978-3-642-39059-3\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GjosteenPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoMSV13, author = {Fuchun Guo and Yi Mu and Willy Susilo and Vijay Varadharajan}, editor = {Colin Boyd and Leonie Simpson}, title = {Membership Encryption and Its Applications}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {219--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_15}, doi = {10.1007/978-3-642-39059-3\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuoMSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IsobeSC13, author = {Takanori Isobe and Yu Sasaki and Jiageng Chen}, editor = {Colin Boyd and Leonie Simpson}, title = {Related-Key Boomerang Attacks on {KATAN32/48/64}}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {268--285}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_19}, doi = {10.1007/978-3-642-39059-3\_19}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IsobeSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KikuchiCIHT13, author = {Ryo Kikuchi and Koji Chida and Dai Ikarashi and Koki Hamada and Katsumi Takahashi}, editor = {Colin Boyd and Leonie Simpson}, title = {Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {419--434}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_29}, doi = {10.1007/978-3-642-39059-3\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KikuchiCIHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimH13, author = {Byoung{-}Il Kim and Jin Hong}, editor = {Colin Boyd and Leonie Simpson}, title = {Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {347--362}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_24}, doi = {10.1007/978-3-642-39059-3\_24}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuZL13, author = {Yao Lu and Rui Zhang and Dongdai Lin}, editor = {Colin Boyd and Leonie Simpson}, title = {Factoring Multi-power {RSA} Modulus {N} = p r q with Partial Known Bits}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {57--71}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_5}, doi = {10.1007/978-3-642-39059-3\_5}, timestamp = {Wed, 06 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LuZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Mitchell13, author = {Chris J. Mitchell}, editor = {Colin Boyd and Leonie Simpson}, title = {Analysing the {IOBC} Authenticated Encryption Mode}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {1--12}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_1}, doi = {10.1007/978-3-642-39059-3\_1}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Mitchell13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PlantardSZ13, author = {Thomas Plantard and Willy Susilo and Zhenfei Zhang}, editor = {Colin Boyd and Leonie Simpson}, title = {Adaptive Precision Floating Point {LLL}}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {104--117}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_8}, doi = {10.1007/978-3-642-39059-3\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PlantardSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QinLH13, author = {Baodong Qin and Shengli Liu and Zhengan Huang}, editor = {Colin Boyd and Leonie Simpson}, title = {Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {136--151}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_10}, doi = {10.1007/978-3-642-39059-3\_10}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QinLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Shi0F13, author = {Zhenqing Shi and Bin Zhang and Dengguo Feng}, editor = {Colin Boyd and Leonie Simpson}, title = {Cryptanalysis of Helix and Phelix Revisited}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {27--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_3}, doi = {10.1007/978-3-642-39059-3\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Shi0F13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SouthS13, author = {Leah F. South and Douglas Stebila}, editor = {Colin Boyd and Leonie Simpson}, title = {Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {388--402}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_27}, doi = {10.1007/978-3-642-39059-3\_27}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SouthS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloAWW13, author = {Willy Susilo and Man Ho Au and Yang Wang and Duncan S. Wong}, editor = {Colin Boyd and Leonie Simpson}, title = {Fairness in Concurrent Signatures Revisited}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {318--329}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_22}, doi = {10.1007/978-3-642-39059-3\_22}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SusiloAWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakahashiFAF13, author = {Junko Takahashi and Toshinori Fukunaga and Kazumaro Aoki and Hitoshi Fuji}, editor = {Colin Boyd and Leonie Simpson}, title = {Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {286--301}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_20}, doi = {10.1007/978-3-642-39059-3\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakahashiFAF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK13, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Colin Boyd and Leonie Simpson}, title = {Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {118--135}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_9}, doi = {10.1007/978-3-642-39059-3\_9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Todo13, author = {Yosuke Todo}, editor = {Colin Boyd and Leonie Simpson}, title = {Upper Bounds for the Security of Several Feistel Networks}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {302--317}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_21}, doi = {10.1007/978-3-642-39059-3\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Todo13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangMAS13, author = {Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo}, editor = {Colin Boyd and Leonie Simpson}, title = {Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {187--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_13}, doi = {10.1007/978-3-642-39059-3\_13}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangMAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuZ13, author = {Yang Yu and Zhanfei Zhou}, editor = {Colin Boyd and Leonie Simpson}, title = {A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {403--418}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_28}, doi = {10.1007/978-3-642-39059-3\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangT13, author = {Hui Zhang and Tsuyoshi Takagi}, editor = {Colin Boyd and Leonie Simpson}, title = {Attacks on Multi-Prime {RSA} with Small Prime Difference}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {41--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_4}, doi = {10.1007/978-3-642-39059-3\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Zheng13, author = {Yuliang Zheng}, editor = {Colin Boyd and Leonie Simpson}, title = {Public Key Cryptography for Mobile Cloud}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {435}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_30}, doi = {10.1007/978-3-642-39059-3\_30}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Zheng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2013, editor = {Colin Boyd and Leonie Simpson}, title = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3}, doi = {10.1007/978-3-642-39059-3}, isbn = {978-3-642-39058-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AlMashrafiBSDW12, author = {Mufeed Juma AlMashrafi and Harry Bartlett and Leonie Simpson and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Analysis of Indirect Message Injection for {MAC} Generation Using Stream Ciphers}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {138--151}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_11}, doi = {10.1007/978-3-642-31448-3\_11}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AlMashrafiBSDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AonoASW12, author = {Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {On the Optimality of Lattices for the Coppersmith Technique}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {376--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_28}, doi = {10.1007/978-3-642-31448-3\_28}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AonoASW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenL12, author = {Jiazhe Chen and Leibo Li}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Low Data Complexity Attack on Reduced Camellia-256}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {101--114}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_8}, doi = {10.1007/978-3-642-31448-3\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenLLWN12, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Khoa Nguyen}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Revocable Identity-Based Encryption from Lattices}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {390--403}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_29}, doi = {10.1007/978-3-642-31448-3\_29}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenLLWN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DingPD12, author = {Jintai Ding and Yanbin Pan and Yingpu Deng}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {An Algebraic Broadcast Attack against {NTRU}}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {124--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_10}, doi = {10.1007/978-3-642-31448-3\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DingPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FleischmannFLW12, author = {Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Weimar-DM: {A} Highly Secure Double-Length Compression Function}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {152--165}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_12}, doi = {10.1007/978-3-642-31448-3\_12}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FleischmannFLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FujiokaMSU12, author = {Atsushi Fujioka and Mark Manulis and Koutarou Suzuki and Berkant Ustaoglu}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {15--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_2}, doi = {10.1007/978-3-642-31448-3\_2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FujiokaMSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GeZCMZ12, author = {Aijun Ge and Rui Zhang and Cheng Chen and Chuangui Ma and Zhenfeng Zhang}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {336--349}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_25}, doi = {10.1007/978-3-642-31448-3\_25}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GeZCMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HigoTYY12, author = {Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {A Game-Theoretic Perspective on Oblivious Transfer}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {29--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_3}, doi = {10.1007/978-3-642-31448-3\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HigoTYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IsobeS12, author = {Takanori Isobe and Kyoji Shibutani}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Security Analysis of the Lightweight Block Ciphers XTEA, {LED} and Piccolo}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {71--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_6}, doi = {10.1007/978-3-642-31448-3\_6}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/IsobeS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JingXL12, author = {Wenpan Jing and Haixia Xu and Bao Li}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Non-malleable Instance-Dependent Commitment in the Standard Model}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {450--457}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_35}, doi = {10.1007/978-3-642-31448-3\_35}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JingXL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KayesHC12, author = {A. S. M. Kayes and Jun Han and Alan W. Colman}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {{ICAF:} {A} Context-Aware Framework for Access Control}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {442--449}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_34}, doi = {10.1007/978-3-642-31448-3\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KayesHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaNP12, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {235--246}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_18}, doi = {10.1007/978-3-642-31448-3\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeBN12, author = {Kaleb Lee and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Minimizing Information Leakage of Tree-Based {RFID} Authentication Protocols Using Alternate Tree-Walking}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {434--441}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_33}, doi = {10.1007/978-3-642-31448-3\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LoryL12, author = {Peter Lory and Manuel Liedel}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {57--70}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_5}, doi = {10.1007/978-3-642-31448-3\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LoryL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MathewVVR12, author = {K. Preetha Mathew and Sachin Vasant and Sridhar Venkatesan and C. Pandu Rangan}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {An Efficient {IND-CCA2} Secure Variant of the Niederreiter Encryption Scheme in the Standard Model}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {166--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_13}, doi = {10.1007/978-3-642-31448-3\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MathewVVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MengZ12, author = {Xianmeng Meng and Xuexin Zheng}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Cryptanalysis of {RSA} with a Small Parameter}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {115--123}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_9}, doi = {10.1007/978-3-642-31448-3\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MengZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MorozovT12, author = {Kirill Morozov and Tsuyoshi Takagi}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Zero-Knowledge Protocols for the McEliece Encryption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {180--193}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_14}, doi = {10.1007/978-3-642-31448-3\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MorozovT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NagashimaK12, author = {Yuji Nagashima and Noboru Kunihiro}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {43--56}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_4}, doi = {10.1007/978-3-642-31448-3\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NagashimaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenTY12, author = {Manh Ha Nguyen and Keisuke Tanaka and Kenji Yasunaga}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {208--222}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_16}, doi = {10.1007/978-3-642-31448-3\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Fully Private Revocable Predicate Encryption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {350--363}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_26}, doi = {10.1007/978-3-642-31448-3\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengH12, author = {Kun Peng and Matt Henricksen}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {How to Fix Two RSA-Based {PVSS} Schemes - Exploration and Solution}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {223--234}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_17}, doi = {10.1007/978-3-642-31448-3\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhanPSS12, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {308--321}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_23}, doi = {10.1007/978-3-642-31448-3\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhanPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PoschmannR12, author = {Axel Poschmann and Matthew J. B. Robshaw}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {On Area, Time, and the Right Trade-Off}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {404--418}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_30}, doi = {10.1007/978-3-642-31448-3\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PoschmannR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RangasamySBNK12, author = {Jothi Rangasamy and Douglas Stebila and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Lakshmi Kuppusamy}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Effort-Release Public-Key Encryption from Cryptographic Puzzles}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {194--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_15}, doi = {10.1007/978-3-642-31448-3\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RangasamySBNK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SasakiEHK12, author = {Yu Sasaki and Sareh Emami and Deukjo Hong and Ashish Kumar}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {87--100}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_7}, doi = {10.1007/978-3-642-31448-3\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SasakiEHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SelviVR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {280--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_21}, doi = {10.1007/978-3-642-31448-3\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SelviVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShahandashtiSO12, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini and Philip Ogunbona}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Private Fingerprint Matching}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {426--433}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_32}, doi = {10.1007/978-3-642-31448-3\_32}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShahandashtiSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Shao12, author = {Jun Shao}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Anonymous ID-Based Proxy Re-Encryption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {364--375}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_27}, doi = {10.1007/978-3-642-31448-3\_27}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Shao12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/StankovskiHJ12, author = {Paul Stankovski and Martin Hell and Thomas Johansson}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Analysis of Xorrotation with Application to an {HC-128} Variant}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {419--425}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_31}, doi = {10.1007/978-3-642-31448-3\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/StankovskiHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TanW12, author = {Xiao Tan and Duncan S. Wong}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {247--260}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_19}, doi = {10.1007/978-3-642-31448-3\_19}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TanW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TianCL12, author = {Haibo Tian and Xiaofeng Chen and Jin Li}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {A Short Non-delegatable Strong Designated Verifier Signature}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {261--279}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_20}, doi = {10.1007/978-3-642-31448-3\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TianCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TosuK12, author = {Kaori Tosu and Noboru Kunihiro}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Optimal Bounds for Multi-Prime {\(\Phi\)}-Hiding Assumption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {1--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_1}, doi = {10.1007/978-3-642-31448-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TosuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuenYH12, author = {Tsz Hon Yuen and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Fully Leakage-Resilient Signatures with Auxiliary Inputs}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {294--307}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_22}, doi = {10.1007/978-3-642-31448-3\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuenYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhouDC12, author = {Xuhua Zhou and Xuhua Ding and Kefei Chen}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {A Generic Construction of Accountable Decryption and Its Applications}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {322--335}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_24}, doi = {10.1007/978-3-642-31448-3\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhouDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2012, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3}, doi = {10.1007/978-3-642-31448-3}, isbn = {978-3-642-31447-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AkramMM11, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Application-Binding Protocol in the User Centric Smart Card Ownership Model}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {208--225}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_14}, doi = {10.1007/978-3-642-22497-3\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AkramMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuSM11, author = {Man Ho Au and Willy Susilo and Yi Mu}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Electronic Cash with Anonymous User Suspension}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {172--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_12}, doi = {10.1007/978-3-642-22497-3\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BogdanovS11, author = {Andrey Bogdanov and Kyoji Shibutani}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {106--119}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_8}, doi = {10.1007/978-3-642-22497-3\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BogdanovS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Carlet11, author = {Claude Carlet}, editor = {Udaya Parampalli and Philip Hawkes}, title = {On Known and New Differentially Uniform Functions}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {1--15}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_1}, doi = {10.1007/978-3-642-22497-3\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Carlet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChatterjeeMU11, author = {Sanjit Chatterjee and Alfred Menezes and Berkant Ustaoglu}, editor = {Udaya Parampalli and Philip Hawkes}, title = {A Generic Variant of NIST's {KAS2} Key Agreement Protocol}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {353--370}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_23}, doi = {10.1007/978-3-642-22497-3\_23}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChatterjeeMU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenJYW11, author = {Jiazhe Chen and Keting Jia and Hongbo Yu and Xiaoyun Wang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {16--33}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_2}, doi = {10.1007/978-3-642-22497-3\_2}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenJYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CorniauxG11, author = {Christian L. F. Corniaux and Hossein Ghodosi}, editor = {Udaya Parampalli and Philip Hawkes}, title = {A Verifiable Distributed Oblivious Transfer Protocol}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {444--450}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_33}, doi = {10.1007/978-3-642-22497-3\_33}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CorniauxG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuZ11, author = {Yusong Du and Fangguo Zhang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {47--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_4}, doi = {10.1007/978-3-642-22497-3\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EmuraMR11, author = {Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Toward Dynamic Attribute-Based Signcryption (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {439--443}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_32}, doi = {10.1007/978-3-642-22497-3\_32}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EmuraMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FanZT11, author = {Jia Fan and Yuliang Zheng and Xiaohu Tang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {A Single Key Pair is Adequate for the Zheng Signcryption}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {371--388}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_24}, doi = {10.1007/978-3-642-22497-3\_24}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FanZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FreireP11, author = {Eduarda S. V. Freire and Kenneth G. Paterson}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Provably Secure Key Assignment Schemes from Factoring}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {292--309}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_19}, doi = {10.1007/978-3-642-22497-3\_19}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FreireP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FujiokaOS11, author = {Atsushi Fujioka and Yoshiaki Okamoto and Taiichi Saito}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Generic Construction of Strongly Secure Timed-Release Public-Key Encryption}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {319--336}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_21}, doi = {10.1007/978-3-642-22497-3\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FujiokaOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GauravaramKBW11, author = {Praveen Gauravaram and Lars R. Knudsen and Nasour Bagheri and Lei Wei}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improved Security Analysis of Fugue-256 (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {428--432}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_30}, doi = {10.1007/978-3-642-22497-3\_30}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GauravaramKBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HatanoMS11, author = {Tetsuya Hatano and Atsuko Miyaji and Takashi Sato}, editor = {Udaya Parampalli and Philip Hawkes}, title = {\emph{T}-Robust Scalable Group Key Exchange Protocol with \emph{O}(log\emph{n}) Complexity}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {189--207}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_13}, doi = {10.1007/978-3-642-22497-3\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HatanoMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LagishettySS11, author = {Shashank Lagishetty and Pruthvi Reddy Sabbu and Kannan Srinathan}, editor = {Udaya Parampalli and Philip Hawkes}, title = {{DMIPS} - Defensive Mechanism against {IP} Spoofing}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {276--291}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_18}, doi = {10.1007/978-3-642-22497-3\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LagishettySS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuCZ11, author = {Joseph K. Liu and Cheng{-}Kang Chu and Jianying Zhou}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Identity-Based Server-Aided Decryption}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {337--352}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_22}, doi = {10.1007/978-3-642-22497-3\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLLJ11, author = {Yamin Liu and Bao Li and Xianhui Lu and Dingding Jia}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Efficient CCA-Secure {CDH} Based {KEM} Balanced between Ciphertext and Key}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {310--318}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_20}, doi = {10.1007/978-3-642-22497-3\_20}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuLLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuLP11, author = {Meicheng Liu and Dongdai Lin and Dingyi Pei}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {34--46}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_3}, doi = {10.1007/978-3-642-22497-3\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuTG11, author = {Hongying Liu and Yukiyasu Tsunoo and Satoshi Goto}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {456--461}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_35}, doi = {10.1007/978-3-642-22497-3\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuTG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Long11, author = {Benjamin W. Long}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Security in Depth through Smart Space Cascades}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {226--240}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_15}, doi = {10.1007/978-3-642-22497-3\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Long11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MinematsuSS11, author = {Kazuhiko Minematsu and Tomoyasu Suzaki and Maki Shigeri}, editor = {Udaya Parampalli and Philip Hawkes}, title = {On Maximum Differential Probability of Generalized Feistel}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {89--105}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_7}, doi = {10.1007/978-3-642-22497-3\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MinematsuSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenWW11, author = {Phuong Ha Nguyen and Hongjun Wu and Huaxiong Wang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {61--74}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_5}, doi = {10.1007/978-3-642-22497-3\_5}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/NguyenWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OhtaharaOSS11, author = {Chiaki Ohtahara and Keita Okada and Yu Sasaki and Takeshi Shimoyama}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Preimage Attacks on Full-ARIRANG (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {417--422}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_28}, doi = {10.1007/978-3-642-22497-3\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OhtaharaOSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Peng11, author = {Kun Peng}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Impracticality of Efficient {PVSS} in Real Life Security Standard (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {451--455}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_34}, doi = {10.1007/978-3-642-22497-3\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PreneelYW11, author = {Bart Preneel and Hirotaka Yoshida and Dai Watanabe}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Finding Collisions for Reduced \emph{Luffa}-256 v2 (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {423--427}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_29}, doi = {10.1007/978-3-642-22497-3\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PreneelYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Sarinay11, author = {Juraj Sarinay}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Faster and Smoother - {VSH} Revisited}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {142--156}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_10}, doi = {10.1007/978-3-642-22497-3\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Sarinay11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SepahiSP11, author = {Reza Sepahi and Ron Steinfeld and Josef Pieprzyk}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Lattice-Based Completely Non-malleable {PKE} in the Standard Model (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {407--411}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_26}, doi = {10.1007/978-3-642-22497-3\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SepahiSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Tang11, author = {Qiang Tang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {389--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_25}, doi = {10.1007/978-3-642-22497-3\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Tang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TeoABSWD11, author = {Sui{-}Guan Teo and Ali Al{-}Hamdan and Harry Bartlett and Leonie Simpson and Kenneth Koon{-}Ho Wong and Ed Dawson}, editor = {Udaya Parampalli and Philip Hawkes}, title = {State Convergence in the Initialisation of Stream Ciphers}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {75--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_6}, doi = {10.1007/978-3-642-22497-3\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TeoABSWD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangSMP11, author = {Meiqin Wang and Yue Sun and Nicky Mouha and Bart Preneel}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Algebraic Techniques in Differential Cryptanalysis Revisited}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {120--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_9}, doi = {10.1007/978-3-642-22497-3\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangSMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiRGWWL11, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN} (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {433--438}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_31}, doi = {10.1007/978-3-642-22497-3\_31}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiRGWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Wright11, author = {Craig S. Wright}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Compliance or Security, What Cost? (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {412--416}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_27}, doi = {10.1007/978-3-642-22497-3\_27}, timestamp = {Tue, 27 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Wright11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuW11, author = {Hongbo Yu and Xiaoyun Wang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Cryptanalysis of the Compression Function of {SIMD}}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {157--171}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_11}, doi = {10.1007/978-3-642-22497-3\_11}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangT11, author = {Mingwu Zhang and Tsuyoshi Takagi}, editor = {Udaya Parampalli and Philip Hawkes}, title = {GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {241--258}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_16}, doi = {10.1007/978-3-642-22497-3\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangTW11, author = {Yun Zhang and Christophe Tartary and Huaxiong Wang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {259--275}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_17}, doi = {10.1007/978-3-642-22497-3\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2011, editor = {Udaya Parampalli and Philip Hawkes}, title = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3}, doi = {10.1007/978-3-642-22497-3}, isbn = {978-3-642-22496-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuSM10, author = {Man Ho Au and Willy Susilo and Yi Mu}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Proof-of-Knowledge of Representation of Committed Value and Its Applications}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {352--369}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_22}, doi = {10.1007/978-3-642-14081-5\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonKKMOPS10, author = {Jean{-}Philippe Aumasson and Emilia K{\"{a}}sper and Lars R. Knudsen and Krystian Matusiewicz and Rune Steinsmo {\O}deg{\aa}rd and Thomas Peyrin and Martin Schl{\"{a}}ffer}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {87--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_6}, doi = {10.1007/978-3-642-14081-5\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonKKMOPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BarbosaF10, author = {Manuel Barbosa and Pooya Farshim}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {145--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_10}, doi = {10.1007/978-3-642-14081-5\_10}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BarbosaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BarbosaF10a, author = {Manuel Barbosa and Pooya Farshim}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Strong Knowledge Extractors for Public-Key Encryption Schemes}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {164--181}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_11}, doi = {10.1007/978-3-642-14081-5\_11}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BarbosaF10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BiasseJS10, author = {Jean{-}Fran{\c{c}}ois Biasse and Michael J. Jacobson Jr. and Alan K. Silvester}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Security Estimates for Quadratic Field Based Cryptosystems}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {233--247}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_15}, doi = {10.1007/978-3-642-14081-5\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BiasseJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BirkettS10, author = {James Birkett and Douglas Stebila}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Predicate-Based Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {282--299}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_18}, doi = {10.1007/978-3-642-14081-5\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BirkettS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BuldasN10, author = {Ahto Buldas and Margus Niitsoo}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {318--335}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_20}, doi = {10.1007/978-3-642-14081-5\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BuldasN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChaabouniLS10, author = {Rafik Chaabouni and Helger Lipmaa and Abhi Shelat}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Additive Combinatorics and Discrete Logarithm Based Range Protocols}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {336--351}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_21}, doi = {10.1007/978-3-642-14081-5\_21}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChaabouniLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenZSTLK10, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Identity-Based Chameleon Hash Scheme without Key Exposure}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {200--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_13}, doi = {10.1007/978-3-642-14081-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EtrogR10, author = {Jonathan Etrog and Matthew J. B. Robshaw}, editor = {Ron Steinfeld and Philip Hawkes}, title = {On Unbiased Linear Approximations}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {74--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_5}, doi = {10.1007/978-3-642-14081-5\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EtrogR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FleischmannGL10, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Some Observations on Indifferentiability}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {117--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_8}, doi = {10.1007/978-3-642-14081-5\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FleischmannGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GorantlaBN10, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Attribute-Based Authenticated Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {300--317}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_19}, doi = {10.1007/978-3-642-14081-5\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GorantlaBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HenricksenYYKT10, author = {Matthew Henricksen and Wun{-}She Yap and Chee Hoo Yian and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Side-Channel Analysis of the {K2} Stream Cipher}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {53--73}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_4}, doi = {10.1007/978-3-642-14081-5\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HenricksenYYKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KlonowskiKK10, author = {Marek Klonowski and Michal Koza and Miroslaw Kutylowski}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {391--402}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_24}, doi = {10.1007/978-3-642-14081-5\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KlonowskiKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kunihiro10, author = {Noboru Kunihiro}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Solving Generalized Small Inverse Problems}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {248--263}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_16}, doi = {10.1007/978-3-642-14081-5\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kunihiro10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiSLQ10, author = {Ruilin Li and Bing Sun and Chao Li and Longjiang Qu}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Cryptanalysis of a Generalized Unbalanced Feistel Network Structure}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_1}, doi = {10.1007/978-3-642-14081-5\_1}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiSLQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenWWL10, author = {Phuong Ha Nguyen and Lei Wei and Huaxiong Wang and San Ling}, editor = {Ron Steinfeld and Philip Hawkes}, title = {On Multidimensional Linear Cryptanalysis}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {37--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_3}, doi = {10.1007/978-3-642-14081-5\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenWWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NishimakiFT10, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, editor = {Ron Steinfeld and Philip Hawkes}, title = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {182--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_12}, doi = {10.1007/978-3-642-14081-5\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NishimakiFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS10, author = {Kenneth G. Paterson and Douglas Stebila}, editor = {Ron Steinfeld and Philip Hawkes}, title = {One-Time-Password-Authenticated Key Exchange}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {264--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_17}, doi = {10.1007/978-3-642-14081-5\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Rechberger10, author = {Christian Rechberger}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Second-Preimage Analysis of Reduced {SHA-1}}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {104--116}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_7}, doi = {10.1007/978-3-642-14081-5\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Rechberger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShaoFZCL10, author = {Jun Shao and Min Feng and Bin B. Zhu and Zhenfu Cao and Peng Liu}, editor = {Ron Steinfeld and Philip Hawkes}, title = {The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {216--232}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_14}, doi = {10.1007/978-3-642-14081-5\_14}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShaoFZCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunVBY10, author = {Li Sun and Steven Versteeg and Serdar Boztas and Trevor Yann}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Pattern Recognition Techniques for the Classification of Malware Packers}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {370--390}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_23}, doi = {10.1007/978-3-642-14081-5\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunVBY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WongB10, author = {Kenneth Koon{-}Ho Wong and Gregory V. Bard}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {19--36}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_2}, doi = {10.1007/978-3-642-14081-5\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WongB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuANS10, author = {Huafei Zhu and Tadashi Araragi and Takashi Nishide and Kouichi Sakurai}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Adaptive and Composable Non-committing Encryptions}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {135--144}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_9}, doi = {10.1007/978-3-642-14081-5\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhuANS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2010, editor = {Ron Steinfeld and Philip Hawkes}, title = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5}, doi = {10.1007/978-3-642-14081-5}, isbn = {978-3-642-14080-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AhmedLSH09, author = {Irfan Ahmed and Kyung{-}suk Lhee and Hyunjung Shin and Manpyo Hong}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On Improving the Accuracy and Performance of Content-Based File Type Identification}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {44--59}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_4}, doi = {10.1007/978-3-642-02620-1\_4}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AhmedLSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonBMNP09, author = {Jean{-}Philippe Aumasson and Eric Brier and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Inside the Hypercube}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {202--213}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_14}, doi = {10.1007/978-3-642-02620-1\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonBMNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoztasPT09, author = {Serdar Boztas and Simon J. Puglisi and Andrew Turpin}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Testing Stream Ciphers by Finding the Longest Substring of a Given Density}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {122--133}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_9}, doi = {10.1007/978-3-642-02620-1\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoztasPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BuldasJN09, author = {Ahto Buldas and Aivo J{\"{u}}rgenson and Margus Niitsoo}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficiency Bounds for Adversary Constructions in Black-Box Reductions}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {264--275}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_19}, doi = {10.1007/978-3-642-02620-1\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BuldasJN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Camp09, author = {L. Jean Camp}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Hardening the Network from the Friend Within}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_17}, doi = {10.1007/978-3-642-02620-1\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Camp09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CheongKN09, author = {Kai{-}Yuen Cheong and Takeshi Koshiba and Shohei Nishiyama}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Strengthening the Security of Distributed Oblivious Transfer}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {377--388}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_26}, doi = {10.1007/978-3-642-02620-1\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CheongKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChoyCKY09, author = {Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {73--89}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_6}, doi = {10.1007/978-3-642-02620-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChoyCKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuWCZD09, author = {Cheng{-}Kang Chu and Jian Weng and Sherman S. M. Chow and Jianying Zhou and Robert H. Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Conditional Proxy Broadcast Re-Encryption}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {327--342}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_23}, doi = {10.1007/978-3-642-02620-1\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChuWCZD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FleischmannGL09, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Attacking 9 and 10 Rounds of {AES-256}}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {60--72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_5}, doi = {10.1007/978-3-642-02620-1\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FleischmannGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HisilWCD09, author = {H{\"{u}}seyin Hisil and Kenneth Koon{-}Ho Wong and Gary Carter and Ed Dawson}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Jacobi Quartic Curves Revisited}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {452--468}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_31}, doi = {10.1007/978-3-642-02620-1\_31}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HisilWCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiwatariTAS09, author = {Harunaga Hiwatari and Keisuke Tanaka and Tomoyuki Asano and Koichi Sakumoto}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Multi-recipient Public-Key Encryption from Simulators in Security Proofs}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {293--308}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_21}, doi = {10.1007/978-3-642-02620-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiwatariTAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HongKKFP09, author = {Jeongdae Hong and Jinil Kim and Jihye Kim and Matthew K. Franklin and Kunsoo Park}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Fair Threshold Decryption with Semi-Trusted Third Parties}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {309--326}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_22}, doi = {10.1007/978-3-642-02620-1\_22}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HongKKFP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lory09, author = {Peter Lory}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Reducing the Complexity in the Distributed Computation of Private {RSA} Keys}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {250--263}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_18}, doi = {10.1007/978-3-642-02620-1\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lory09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsudaNNT09, author = {Toshihide Matsuda and Ryo Nishimaki and Akira Numayama and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {343--359}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_24}, doi = {10.1007/978-3-642-02620-1\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsudaNNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MiyajiS09, author = {Atsuko Miyaji and Masahiro Sukegawa}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {New Correlations of {RC4} {PRGA} Using Nonzero-Bit Differences}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {134--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_10}, doi = {10.1007/978-3-642-02620-1\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MiyajiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MrabetN09, author = {Nadia El Mrabet and Christophe N{\`{e}}gre}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Finite Field Multiplication Combining {AMNS} and {DFT} Approach for Pairing Cryptography}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {422--436}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_29}, doi = {10.1007/978-3-642-02620-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MrabetN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Nandi09, author = {Mridul Nandi}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Characterizing Padding Rules of {MD} Hash Functions Preserving Collision Security}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {171--184}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_12}, doi = {10.1007/978-3-642-02620-1\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Nandi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NumayamaT09, author = {Akira Numayama and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Weak Ideal Compression Functions}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {232--248}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_16}, doi = {10.1007/978-3-642-02620-1\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NumayamaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OzenVTK09, author = {Onur {\"{O}}zen and Kerem Varici and Cihangir Tezcan and {\c{C}}elebi Kocair}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round {PRESENT} and {HIGHT}}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {90--107}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_7}, doi = {10.1007/978-3-642-02620-1\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OzenVTK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS09, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Building Key-Private Public-Key Encryption Schemes}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {276--292}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_20}, doi = {10.1007/978-3-642-02620-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhamK09, author = {Dang Vinh Pham and Dogan Kesdogan}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Combinatorial Approach for an Anonymity Metric}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {26--43}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_3}, doi = {10.1007/978-3-642-02620-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhamK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReyhanitabarSM09, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Analysis of Property-Preservation Capabilities of the {ROX} and ESh Hash Domain Extenders}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {153--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_11}, doi = {10.1007/978-3-642-02620-1\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReyhanitabarSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SasakiA09, author = {Yu Sasaki and Kazumaro Aoki}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to {RIPEMD} and Others}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {214--231}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_15}, doi = {10.1007/978-3-642-02620-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SasakiA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SeifertDKSW09, author = {Christian Seifert and Vipul Delwadia and Peter Komisarczuk and David Stirling and Ian Welch}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Measurement Study on Malicious Web Servers in the .nz Domain}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {8--25}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_2}, doi = {10.1007/978-3-642-02620-1\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SeifertDKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SimpsonHY09, author = {Leonie Simpson and Matthew Henricksen and Wun{-}She Yap}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {108--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_8}, doi = {10.1007/978-3-642-02620-1\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SimpsonHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Solms09, author = {Basie von Solms}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Is the Information Security King Naked?}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {1--7}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_1}, doi = {10.1007/978-3-642-02620-1\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Solms09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/StebilaU09, author = {Douglas Stebila and Berkant Ustaoglu}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Towards Denial-of-Service-Resilient Key Agreement Protocols}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {389--406}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_27}, doi = {10.1007/978-3-642-02620-1\_27}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/StebilaU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Tunstall09, author = {Michael Tunstall}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Random Order m-ary Exponentiation}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {437--451}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_30}, doi = {10.1007/978-3-642-02620-1\_30}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Tunstall09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Wikstrom09, author = {Douglas Wikstr{\"{o}}m}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Commitment-Consistent Proof of a Shuffle}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {407--421}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_28}, doi = {10.1007/978-3-642-02620-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Wikstrom09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuS09, author = {Jiang Wu and Douglas R. Stinson}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Highly Scalable {RFID} Authentication Protocol}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {360--376}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_25}, doi = {10.1007/978-3-642-02620-1\_25}, timestamp = {Fri, 23 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuW09, author = {Hongbo Yu and Xiaoyun Wang}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Distinguishing Attack on the Secret-Prefix {MAC} Based on the 39-Step {SHA-256}}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {185--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_13}, doi = {10.1007/978-3-642-02620-1\_13}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YuW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2009, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1}, doi = {10.1007/978-3-642-02620-1}, isbn = {978-3-642-02619-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BarbosaBCS08, author = {Manuel Barbosa and Thierry Brouard and St{\'{e}}phane Cauchie and Sim{\~{a}}o Melo de Sousa}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Secure Biometric Authentication with Improved Accuracy}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {21--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_3}, doi = {10.1007/978-3-540-70500-0\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BarbosaBCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRSY08, author = {Olivier Billet and Matthew J. B. Robshaw and Yannick Seurin and Yiqun Lisa Yin}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Looking Back at a New Hash Function}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {239--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_18}, doi = {10.1007/978-3-540-70500-0\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient One-Round Key Exchange in the Standard Model}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {69--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_6}, doi = {10.1007/978-3-540-70500-0\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Boyen08, author = {Xavier Boyen}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {New Paradigms for Password Security}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {1--5}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_1}, doi = {10.1007/978-3-540-70500-0\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Boyen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CichonKK08, author = {Jacek Cichon and Marek Klonowski and Miroslaw Kutylowski}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Distributed Verification of Mixing - Local Forking Proofs Model}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {128--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_10}, doi = {10.1007/978-3-540-70500-0\_10}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CichonKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {187--202}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_14}, doi = {10.1007/978-3-540-70500-0\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DocheH08, author = {Christophe Doche and Laurent Habsieger}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {A Tree-Based Approach for Computing Double-Base Chains}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {433--446}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_32}, doi = {10.1007/978-3-540-70500-0\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DocheH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Farashahi08, author = {Reza Rezaeian Farashahi}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {447--462}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_33}, doi = {10.1007/978-3-540-70500-0\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Farashahi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GajekMS08, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {6--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_2}, doi = {10.1007/978-3-540-70500-0\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GajekMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HakalaN08, author = {Risto M. Hakala and Kaisa Nyberg}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Linear Distinguishing Attack on Shannon}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {297--305}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_22}, doi = {10.1007/978-3-540-70500-0\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HakalaN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HermelinCN08, author = {Miia Hermelin and Joo Yeon Cho and Kaisa Nyberg}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Multidimensional Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {203--215}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_15}, doi = {10.1007/978-3-540-70500-0\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HermelinCN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiranoWT08, author = {Takato Hirano and Koichiro Wada and Keisuke Tanaka}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Public-Key Cryptosystems with Primitive Power Roots of Unity}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {98--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_8}, doi = {10.1007/978-3-540-70500-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimL08, author = {Sunghyun Kim and Heejo Lee}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Reducing Payload Scans for Attack Signature Matching Using Rule Classification}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {350--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_26}, doi = {10.1007/978-3-540-70500-0\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KohliB08, author = {Pankaj Kohli and Bezawada Bruhadeshwar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {FormatShield: {A} Binary Rewriting Defense against Format String Attacks}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {376--390}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_28}, doi = {10.1007/978-3-540-70500-0\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KohliB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeJSH08, author = {Yuseop Lee and Kitae Jeong and Jaechul Sung and Seokhie Hong}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Related-Key Chosen {IV} Attacks on Grain-v1 and Grain-128}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {321--335}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_24}, doi = {10.1007/978-3-540-70500-0\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeJSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiWPY08, author = {Min Li and Hua Wang and Ashley W. Plank and Jianming Yong}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Advanced Permission-Role Relationship in Role-Based Access Control}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {391--403}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_29}, doi = {10.1007/978-3-540-70500-0\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiWPY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaitraP08, author = {Subhamoy Maitra and Goutam Paul}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Recovering {RC4} Permutation from 2048 Keystream Bytes if jIs Stuck}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {306--320}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_23}, doi = {10.1007/978-3-540-70500-0\_23}, timestamp = {Sun, 17 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MaitraP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MedosB08, author = {Silvana Medos and Serdar Boztas}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {419--432}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_31}, doi = {10.1007/978-3-540-70500-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MedosB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MendelS08, author = {Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Collisions for Round-Reduced {LAKE}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {267--281}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_20}, doi = {10.1007/978-3-540-70500-0\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MendelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MenezesU08, author = {Alfred Menezes and Berkant Ustaoglu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Comparing the Pre- and Post-specified Peer Models for Key Agreement}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {53--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_5}, doi = {10.1007/978-3-540-70500-0\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MenezesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NegreP08, author = {Christophe N{\`{e}}gre and Thomas Plantard}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {463--477}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_34}, doi = {10.1007/978-3-540-70500-0\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NegreP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OommenF08, author = {B. John Oommen and Ebaa Fayyoumi}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {404--418}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_30}, doi = {10.1007/978-3-540-70500-0\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OommenF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatraCVR08, author = {Arpita Patra and Ashish Choudhary and Madhu Vaidyanathan and C. Pandu Rangan}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {170--186}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_13}, doi = {10.1007/978-3-540-70500-0\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatraCVR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SanadhyaS08, author = {Somitra Kumar Sanadhya and Palash Sarkar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Non-linear Reduced Round Attacks against {SHA-2} Hash Family}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {254--266}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_19}, doi = {10.1007/978-3-540-70500-0\_19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SanadhyaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SasakiA08, author = {Yu Sasaki and Kazumaro Aoki}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Preimage Attacks on Step-Reduced {MD5}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {282--296}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_21}, doi = {10.1007/978-3-540-70500-0\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SasakiA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08, author = {V. Sai Sathyanarayan and Pankaj Kohli and Bezawada Bruhadeshwar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Signature Generation and Detection of Malware Families}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {336--349}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_25}, doi = {10.1007/978-3-540-70500-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SathyanarayanKB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SuiS08, author = {Jiayuan Sui and Douglas R. Stinson}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {A Critical Analysis and Improvement of {AACS} Drive-Host Authentication}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {37--52}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_4}, doi = {10.1007/978-3-540-70500-0\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SuiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWWG08, author = {Hung{-}Min Sun and Mu{-}En Wu and Huaxiong Wang and Jian Guo}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Improvement of the {BDF} Attack on {LSBS-RSA}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {84--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_7}, doi = {10.1007/978-3-540-70500-0\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TeranishiO08, author = {Isamu Teranishi and Wakaha Ogata}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Relationship between Two Approaches for Defining the Standard Model PA-ness}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {113--127}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_9}, doi = {10.1007/978-3-540-70500-0\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TeranishiO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangFWZ08, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Unprovable Security of 2-Key {XCBC}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {230--238}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_17}, doi = {10.1007/978-3-540-70500-0\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangFWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenZWC08, author = {Yan Wen and Jinjing Zhao and Huaimin Wang and Jiannong Cao}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {361--375}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_27}, doi = {10.1007/978-3-540-70500-0\_27}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenZWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YeWPZ08, author = {Qingsong Ye and Huaxiong Wang and Josef Pieprzyk and Xian{-}Mo Zhang}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Disjointness Tests for Private Datasets}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {155--169}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_12}, doi = {10.1007/978-3-540-70500-0\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YeWPZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZW08, author = {Lei Zhang and Wentao Zhang and Wenling Wu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {216--229}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_16}, doi = {10.1007/978-3-540-70500-0\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Zhu08, author = {Huafei Zhu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Fully-Simulatable Oblivious Set Transfer}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {141--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_11}, doi = {10.1007/978-3-540-70500-0\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Zhu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2008, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0}, doi = {10.1007/978-3-540-70500-0}, isbn = {978-3-540-69971-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Al-HinaiDHS07, author = {Sultan Al{-}Hinai and Ed Dawson and Matthew Henricksen and Leonie Ruth Simpson}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On the Security of the {LILI} Family of Stream Ciphers Against Algebraic Attacks}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {11--28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_2}, doi = {10.1007/978-3-540-73458-1\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Al-HinaiDHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Araki07, author = {Toshinori Araki}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient (\emph{k}, \emph{n}) Threshold Secret Sharing Schemes Secure Against Cheating from \emph{n}-1 Cheaters}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {133--142}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_11}, doi = {10.1007/978-3-540-73458-1\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Araki07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ArakiO07, author = {Toshinori Araki and Satoshi Obana}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Flaws in Some Secret Sharing Schemes Against Cheating}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {122--132}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_10}, doi = {10.1007/978-3-540-73458-1\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ArakiO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuSM07, author = {Man Ho Au and Willy Susilo and Yi Mu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Practical Compact E-Cash}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {431--445}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_31}, doi = {10.1007/978-3-540-73458-1\_31}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonFMV07, author = {Jean{-}Philippe Aumasson and Matthieu Finiasz and Willi Meier and Serge Vaudenay}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {\emph{TCH}\emph{o}: {A} Hardware-Oriented Trapdoor Cipher}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {184--199}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_15}, doi = {10.1007/978-3-540-73458-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonFMV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BabbageCPR07, author = {Steve Babbage and Carlos Cid and Norbert Pramstaller and H{\aa}vard Raddum}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Analysis of the Hermes8 Stream Ciphers}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {1--10}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_1}, doi = {10.1007/978-3-540-73458-1\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BabbageCPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BhattacharyaMSC07, author = {Debojyoti Bhattacharya and Debdeep Mukhopadhyay and Dhiman Saha and Dipanwita Roy Chowdhury}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Strengthening {NLS} Against Crossword Puzzle Attack}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {29--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_3}, doi = {10.1007/978-3-540-73458-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRP07, author = {Olivier Billet and Matthew J. B. Robshaw and Thomas Peyrin}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On Building Hash Functions from Multivariate Quadratic Equations}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {82--95}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_7}, doi = {10.1007/978-3-540-73458-1\_7}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BirkettDNS07, author = {James Birkett and Alexander W. Dent and Gregory Neven and Jacob C. N. Schuldt}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {274--292}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_21}, doi = {10.1007/978-3-540-73458-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BirkettDNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrandsDD07, author = {Stefan Brands and Liesje Demuynck and Bart De Decker}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {400--415}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_29}, doi = {10.1007/978-3-540-73458-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrandsDD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Malika Izabach{\`{e}}ne and David Pointcheval and Qiang Tang and S{\'{e}}bastien Zimmer}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {96--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_8}, doi = {10.1007/978-3-540-73458-1\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChangYSHL07, author = {Donghoon Chang and Moti Yung and Jaechul Sung and Seokhie Hong and Sangjin Lee}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Preimage Attack on the Parallel FFT-Hashing Function}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {59--67}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_5}, doi = {10.1007/978-3-540-73458-1\_5}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {323--337}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_24}, doi = {10.1007/978-3-540-73458-1\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DahmenOS07, author = {Erik Dahmen and Katsuyuki Okeya and Daniel Schepers}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {245--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_19}, doi = {10.1007/978-3-540-73458-1\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DahmenOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamgardGK07, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient and Secure Comparison for On-Line Auctions}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {416--430}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_30}, doi = {10.1007/978-3-540-73458-1\_30}, timestamp = {Fri, 02 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DamgardGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GolicB07, author = {Jovan Dj. Golic and Madalina Baltatu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Soft Generation of Secure Biometric Keys}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {107--121}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_9}, doi = {10.1007/978-3-540-73458-1\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GolicB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HayashiT07, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Anonymity on Paillier's Trap-Door Permutation}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {200--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_16}, doi = {10.1007/978-3-540-73458-1\_16}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HayashiT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangMSWW07, author = {Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Certificateless Signature Revisited}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {308--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_23}, doi = {10.1007/978-3-540-73458-1\_23}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangW07, author = {Qiong Huang and Duncan S. Wong}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Generic Certificateless Key Encapsulation Mechanism}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {215--229}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_17}, doi = {10.1007/978-3-540-73458-1\_17}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshiharaAHS07, author = {Takeru Ishihara and Hiroshi Aono and Sadayuki Hongo and Junji Shikata}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold {KEM}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {259--273}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_20}, doi = {10.1007/978-3-540-73458-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshiharaAHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JeongLSHL07, author = {Kitae Jeong and Changhoon Lee and Jaechul Sung and Seokhie Hong and Jongin Lim}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {143--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_12}, doi = {10.1007/978-3-540-73458-1\_12}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/JeongLSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07, author = {Fen Liu and Wen Ji and Lei Hu and Jintai Ding and Shuwang Lv and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Analysis of the {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {158--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_13}, doi = {10.1007/978-3-540-73458-1\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanigrahiKSM07, author = {Suvasini Panigrahi and Amlan Kundu and Shamik Sural and Arun K. Majumdar}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {446--460}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_32}, doi = {10.1007/978-3-540-73458-1\_32}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanigrahiKSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PasiniV07, author = {Sylvain Pasini and Serge Vaudenay}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Hash-and-Sign with Weak Hashing Made Secure}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {338--354}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_25}, doi = {10.1007/978-3-540-73458-1\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PasiniV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PramstallerLR07, author = {Norbert Pramstaller and Mario Lamberger and Vincent Rijmen}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Second Preimages for Iterated Hash Functions and Their Implications on MACs}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {68--81}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_6}, doi = {10.1007/978-3-540-73458-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PramstallerLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReyhanitabarWS07, author = {Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi{-}Naini}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {385--399}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_28}, doi = {10.1007/978-3-540-73458-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReyhanitabarWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SrinathanRC07, author = {Kannan Srinathan and Prasad Raghavendra and C. Pandu Rangan}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On Proactive Perfectly Secure Message Transmission}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {461--473}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_33}, doi = {10.1007/978-3-540-73458-1\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SrinathanRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TartaryW07, author = {Christophe Tartary and Huaxiong Wang}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Combining Prediction Hashing and {MDS} Codes for Efficient Multicast Stream Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {293--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_22}, doi = {10.1007/978-3-540-73458-1\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TartaryW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuBD07, author = {Yongdong Wu and Feng Bao and Robert H. Deng}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {171--183}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_14}, doi = {10.1007/978-3-540-73458-1\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuBD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07, author = {Jun Yajima and Yu Sasaki and Yusuke Naito and Terutoshi Iwasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A New Strategy for Finding a Differential Path of {SHA-1}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {45--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_4}, doi = {10.1007/978-3-540-73458-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamuraKN07, author = {Akihiro Yamamura and Takashi Kurokawa and Junji Nakazato}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Threshold Anonymous Group Identification and Zero-Knowledge Proof}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {370--384}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_27}, doi = {10.1007/978-3-540-73458-1\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamuraKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yasuda07, author = {Kan Yasuda}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {355--369}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_26}, doi = {10.1007/978-3-540-73458-1\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yasuda07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoshinoOV07, author = {Masayuki Yoshino and Katsuyuki Okeya and Camille Vuillaume}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Double-Size Bipartite Modular Multiplication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {230--244}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_18}, doi = {10.1007/978-3-540-73458-1\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YoshinoOV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2007, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1}, doi = {10.1007/978-3-540-73458-1}, isbn = {978-3-540-73457-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AbeCIK06, author = {Masayuki Abe and Yang Cui and Hideki Imai and Kaoru Kurosawa}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Tag-KEM from Set Partial Domain One-Way Permutations}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {360--370}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_30}, doi = {10.1007/11780656\_30}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbeCIK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AdelsbachHS06, author = {Andr{\'{e}} Adelsbach and Ulrich Huber and Ahmad{-}Reza Sadeghi}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {136--147}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_12}, doi = {10.1007/11780656\_12}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AdelsbachHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AgudoLM06, author = {Isaac Agudo and Javier L{\'{o}}pez and Jos{\'{e}} A. Montenegro}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Graphical Representation of Authorization Policies for Weighted Credentials}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {383--394}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_32}, doi = {10.1007/11780656\_32}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AgudoLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Al-HinaiBCW06, author = {Sultan Al{-}Hinai and Lynn Margaret Batten and Bernard D. Colbert and Kenneth Koon{-}Ho Wong}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Algebraic Attacks on Clock-Controlled Stream Ciphers}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {1--16}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_1}, doi = {10.1007/11780656\_1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Al-HinaiBCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuSY06, author = {Man Ho Au and Willy Susilo and Siu{-}Ming Yiu}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Event-Oriented \emph{k}-Times Revocable-iff-Linked Group Signatures}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {223--234}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_19}, doi = {10.1007/11780656\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydCM06, author = {Colin Boyd and Kim{-}Kwang Raymond Choo and Anish Mathuria}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {An Extension to Bellare and Rogaway {(1993)} Model: Resetting Compromised Long-Term Keys}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {371--382}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_31}, doi = {10.1007/11780656\_31}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BraekenLP06, author = {An Braeken and Joseph Lano and Bart Preneel}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {40--51}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_4}, doi = {10.1007/11780656\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BraekenLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BurmesterLM06, author = {Mike Burmester and Tri Van Le and Breno de Medeiros}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Towards Provable Security for Ubiquitous Applications}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {295--312}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_25}, doi = {10.1007/11780656\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BurmesterLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChoP06, author = {Joo Yeon Cho and Josef Pieprzyk}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Distinguishing Attack on {SOBER-128} with Linear Masking}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {29--39}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_3}, doi = {10.1007/11780656\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChoP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CourtoisDG06, author = {Nicolas T. Courtois and Blandine Debraize and Eric Garrido}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {76--86}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_7}, doi = {10.1007/11780656\_7}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CourtoisDG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuanC06, author = {Shanshan Duan and Zhenfu Cao}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Efficient and Provably Secure Multi-receiver Identity-Based Signcryption}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {195--206}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_17}, doi = {10.1007/11780656\_17}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuanC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FayyoumiO06, author = {Ebaa Fayyoumi and B. John Oommen}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {On Optimizing the \emph{k}-Ward Micro-aggregation Technique for Secure Statistical Databases}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {324--335}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_27}, doi = {10.1007/11780656\_27}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FayyoumiO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FournierT06, author = {Jacques J. A. Fournier and Michael Tunstall}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Cache Based Power Analysis Attacks on {AES}}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {17--28}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_2}, doi = {10.1007/11780656\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FournierT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GauravaramMDV06, author = {Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Constructing Secure Hash Functions by Enhancing Merkle-Damg{\aa}rd Construction}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {407--420}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_34}, doi = {10.1007/11780656\_34}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GauravaramMDV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HayashiT06, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {{PA} in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {271--282}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_23}, doi = {10.1007/11780656\_23}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HayashiT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HenricksenD06, author = {Matthew Henricksen and Ed Dawson}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {52--63}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_5}, doi = {10.1007/11780656\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HenricksenD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HolfordC06, author = {John W. Holford and William J. Caelli}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {183--194}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_16}, doi = {10.1007/11780656\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HolfordC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuWZD06, author = {Bessie C. Hu and Duncan S. Wong and Zhenfeng Zhang and Xiaotie Deng}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Key Replacement Attack Against a Generic Construction of Certificateless Signature}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {235--246}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_20}, doi = {10.1007/11780656\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuWZD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Jiang06, author = {Shaoquan Jiang}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Efficient Primitives from Exponentiation in Z\({}_{\mbox{p}}\)}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {259--270}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_22}, doi = {10.1007/11780656\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Jiang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KiltzG06, author = {Eike Kiltz and David Galindo}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {336--347}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_28}, doi = {10.1007/11780656\_28}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KiltzG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KitagawaYHZWMI06, author = {Takashi Kitagawa and Peng Yang and Goichiro Hanaoka and Rui Zhang and Hajime Watanabe and Kanta Matsuura and Hideki Imai}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and {REACT}}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {348--359}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_29}, doi = {10.1007/11780656\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KitagawaYHZWMI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LakshminarayananL06, author = {Anantharaman Lakshminarayanan and Tong{-}Lee Lim}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Augmented Certificate Revocation Lists}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {87--98}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_8}, doi = {10.1007/11780656\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LakshminarayananL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeKSHL06, author = {Changhoon Lee and Jongsung Kim and Jaechul Sung and Seokhie Hong and Sangjin Lee}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Forgery and Key Recovery Attacks on {PMAC} and Mitchell's {TMAC} Variant}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {421--431}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_35}, doi = {10.1007/11780656\_35}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeKSHL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OgawaHI06, author = {Kazuto Ogawa and Goichiro Hanaoka and Hideki Imai}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere {TV} Service}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {123--135}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_11}, doi = {10.1007/11780656\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OgawaHI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Okeya06, author = {Katsuyuki Okeya}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {432--443}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_36}, doi = {10.1007/11780656\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Okeya06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Overbeck06, author = {Raphael Overbeck}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Statistical Decoding Revisited}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {283--294}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_24}, doi = {10.1007/11780656\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Overbeck06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS06, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Efficient Identity-Based Signatures Secure in the Standard Model}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {207--222}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_18}, doi = {10.1007/11780656\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengBDO06, author = {Kun Peng and Colin Boyd and Ed Dawson and Eiji Okamoto}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {A Novel Range Test}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {247--258}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_21}, doi = {10.1007/11780656\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengBDO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QuynhT06, author = {Anh{-}Quynh Nguyen and Yoshiyasu Takefuji}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Towards an Invisible Honeypot Monitoring System}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {111--122}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_10}, doi = {10.1007/11780656\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QuynhT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SimpsonH06, author = {Leonie Ruth Simpson and Matthew Henricksen}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Improved Cryptanalysis of {MAG}}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {64--75}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_6}, doi = {10.1007/11780656\_6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SimpsonH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunLW06, author = {Hung{-}Min Sun and Yue{-}Hsun Lin and Ming{-}Fung Wu}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {{API} Monitoring System for Defeating Worms and Exploits in MS-Windows System}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {159--170}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_14}, doi = {10.1007/11780656\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuMS06, author = {Shidi Xu and Yi Mu and Willy Susilo}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Online/Offline Signatures and Multisignatures for {AODV} and {DSR} Routing Security}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {99--110}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_9}, doi = {10.1007/11780656\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YinB06, author = {Yin Yin and Bao Li}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Secure Cross-Realm {C2C-PAKE} Protocol}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {395--406}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_33}, doi = {10.1007/11780656\_33}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YinB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuLP06, author = {Yu Yu and Jussipekka Leiwo and A. Benjamin Premkumar}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Hiding Circuit Topology from Unbounded Reverse Engineers}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {171--182}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_15}, doi = {10.1007/11780656\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuB06, author = {Huafei Zhu and Feng Bao}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {More on Stand-Alone and Setup-Free Verifiably Committed Signatures}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {148--158}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_13}, doi = {10.1007/11780656\_13}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhuB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhuB06a, author = {Huafei Zhu and Feng Bao}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Oblivious Scalar-Product Protocols}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {313--323}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_26}, doi = {10.1007/11780656\_26}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhuB06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2006, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656}, doi = {10.1007/11780656}, isbn = {3-540-35458-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AngSM05, author = {Russell Ang and Reihaneh Safavi{-}Naini and Luke McAven}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Cancelable Key-Based Fingerprint Templates}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {242--252}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_21}, doi = {10.1007/11506157\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AngSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AsanoK05, author = {Tomoyuki Asano and Kazuya Kamio}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {89--100}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_8}, doi = {10.1007/11506157\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AsanoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuraNG05, author = {Tuomas Aura and Aarthi Nagarajan and Andrei V. Gurtov}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Analysis of the {HIP} Base Exchange Protocol}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {481--493}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_40}, doi = {10.1007/11506157\_40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuraNG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bevan05, author = {R{\'{e}}gis Bevan}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Improved Zero Value Attack on {XTR}}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {207--217}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_18}, doi = {10.1007/11506157\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Bevan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BicakciCT05, author = {Kemal Bicakci and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Counting Abuses Using Flexible Off-line Credentials}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {548--559}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_46}, doi = {10.1007/11506157\_46}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BicakciCT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BlakleyB05, author = {Bob Blakley and G. R. Blakley}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {All Sail, No Anchor {III:} Risk Aggregation and Time's Arrow}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {1--16}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_1}, doi = {10.1007/11506157\_1}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BlakleyB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChoiHLS05, author = {Kyu Young Choi and Jung Yeon Hwang and Dong Hoon Lee and In Seog Seo}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {ID-based Authenticated Key Agreement for Low-Power Mobile Devices}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {494--505}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_41}, doi = {10.1007/11506157\_41}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChoiHLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChooH05, author = {Kim{-}Kwang Raymond Choo and Yvonne Hitchcock}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {429--442}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_36}, doi = {10.1007/11506157\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChooH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChowHYC05, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {316--328}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_27}, doi = {10.1007/11506157\_27}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChowHYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ContiniS05, author = {Scott Contini and Igor E. Shparlinski}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On Stern's Attack Against Secret Truncated Linear Congruential Generators}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {52--60}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_5}, doi = {10.1007/11506157\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ContiniS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Dent05, author = {Alexander W. Dent}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Hybrid Signcryption Schemes with Insider Security}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {253--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_22}, doi = {10.1007/11506157\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Dent05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Desmedt05, author = {Yvo Desmedt}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Potential Impacts of a Growing Gap Between Theory and Practice in Information Security}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {532--536}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_44}, doi = {10.1007/11506157\_44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Doche05, author = {Christophe Doche}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Redundant Trinomials for Finite Fields of Characteristic 2}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {122--133}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_11}, doi = {10.1007/11506157\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Doche05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuttaB05, author = {Ratna Dutta and Rana Barua}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Dynamic Group Key Agreement in Tree-Based Setting}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {101--112}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_9}, doi = {10.1007/11506157\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuttaB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FurukawaI05, author = {Jun Furukawa and Hideki Imai}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An Efficient Group Signature Scheme from Bilinear Maps}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {455--467}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_38}, doi = {10.1007/11506157\_38}, timestamp = {Sat, 30 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FurukawaI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GalbraithHM05, author = {Steven D. Galbraith and Chris Heneghan and James F. McKee}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Tunable Balancing of {RSA}}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {280--292}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_24}, doi = {10.1007/11506157\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GalbraithHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GiansiracusaRCH05, author = {Michelangelo Giansiracusa and Selwyn Russell and Andrew J. Clark and John Hynd}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An Improved Execution Integrity Solution for Mobile Agents}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {170--183}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_15}, doi = {10.1007/11506157\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GiansiracusaRCH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GoyalT05, author = {Vipul Goyal and Rohit Tripathy}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An Efficient Solution to the {ARP} Cache Poisoning Problem}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {40--51}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_4}, doi = {10.1007/11506157\_4}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GoyalT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoZT05, author = {Xingyang Guo and Quan Zhang and Chaojing Tang}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Security of Two Key-Updating Signature Schemes}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {506--517}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_42}, doi = {10.1007/11506157\_42}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuoZT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IsshikiT05, author = {Toshiyuki Isshiki and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An (n-t)-out-of-n Threshold Ring Signature Scheme}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {406--416}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_34}, doi = {10.1007/11506157\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IsshikiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JinQSZ05, author = {Hai Jin and Weizhong Qiang and Xuanhua Shi and Deqing Zou}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {VO-Sec: An Access Control Framework for Dynamic Virtual Organization}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {370--381}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_31}, doi = {10.1007/11506157\_31}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JinQSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/King05, author = {Brian King}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An Efficient Implementation of a Threshold {RSA} Signature Scheme}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {382--393}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_32}, doi = {10.1007/11506157\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/King05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KitamuraKT05, author = {Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {146--157}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_13}, doi = {10.1007/11506157\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KitamuraKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kwon05, author = {Soonhak Kwon}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {134--145}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_12}, doi = {10.1007/11506157\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kwon05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LenstraW05, author = {Arjen K. Lenstra and Benne de Weger}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Possibility of Constructing Meaningful Hash Collisions for Public Keys}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {267--279}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_23}, doi = {10.1007/11506157\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LenstraW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiYC05, author = {Celia Li and Cungang Yang and Richard Cheung}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Key Management for Role Hierarchy in Distributed Systems}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {293--302}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_25}, doi = {10.1007/11506157\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LuiCHY05, author = {Richard W. C. Lui and Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Role Activation Management in Role Based Access Control}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {358--369}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_30}, doi = {10.1007/11506157\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LuiCHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LvH05, author = {Jiqiang Lv and Yongfei Han}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Enhanced {DES} Implementation Secure Against High-Order Differential Power Analysis in Smartcards}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {195--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_17}, doi = {10.1007/11506157\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LvH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/McCombW05, author = {Tim McComb and Luke Wildman}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {{SIFA:} {A} Tool for Evaluation of High-Grade Security Devices}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {230--241}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_20}, doi = {10.1007/11506157\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/McCombW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/McCullaghC05, author = {Adrian McCullagh and William J. Caelli}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Who Goes There? Internet Banking: {A} Matter of Risk and Reward}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {336--357}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_29}, doi = {10.1007/11506157\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/McCullaghC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Millan05, author = {William Millan}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {New Cryptographic Applications of Boolean Function Equivalence Classes}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {572--583}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_48}, doi = {10.1007/11506157\_48}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Millan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Mitchell05, author = {Chris J. Mitchell}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Cryptanalysis of Two Variants of {PCBC} Mode When Used for Message Integrity}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {560--571}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_47}, doi = {10.1007/11506157\_47}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Mitchell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MiyajiT05, author = {Atsuko Miyaji and Yuuki Takano}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Success Probability of chi\({}^{\mbox{2}}\)-attack on {RC6}}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {61--74}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_6}, doi = {10.1007/11506157\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MiyajiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakanishiKHF05, author = {Toru Nakanishi and Fumiaki Kubooka and Naoto Hamada and Nobuo Funabiki}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Group Signature Schemes with Membership Revocation for Large Groups}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {443--454}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_37}, doi = {10.1007/11506157\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakanishiKHF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OkeyaTV05, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {218--229}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_19}, doi = {10.1007/11506157\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OkeyaTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PaulP05, author = {Souradyuti Paul and Bart Preneel}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Solving Systems of Differential Equations of Addition}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {75--88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_7}, doi = {10.1007/11506157\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PudneyS05, author = {Phillip Pudney and Jill Slay}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {29--39}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_3}, doi = {10.1007/11506157\_3}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PudneyS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RiebackCT05, author = {Melanie R. Rieback and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {{RFID} Guardian: {A} Battery-Powered Mobile Device for {RFID} Privacy Management}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {184--194}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_16}, doi = {10.1007/11506157\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RiebackCT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SteketeeBNM05, author = {Chris Steketee and Jaimee Brown and Juan Manuel Gonz{\'{a}}lez Nieto and Paul Montague}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {{GBD} Threshold Cryptography with an Application to {RSA} Key Recovery}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {394--405}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_33}, doi = {10.1007/11506157\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SteketeeBNM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloM05, author = {Willy Susilo and Yi Mu}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Security of Nominative Signatures}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {329--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_28}, doi = {10.1007/11506157\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SusiloM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TschofenigGYNS05, author = {Hannes Tschofenig and Andrei V. Gurtov and Jukka Ylitalo and Aarthi Nagarajan and Murugaraj Shanmugam}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Traversing Middleboxes with the Host Identity Protocol}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {17--28}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_2}, doi = {10.1007/11506157\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TschofenigGYNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangZ05, author = {Shujing Wang and Yan Zhang}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Formalization of Distributed Authorization with Delegation}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {303--315}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_26}, doi = {10.1007/11506157\_26}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiYZ05, author = {Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Group Signature Where Group Manager, Members and Open Authority Are Identity-Based}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {468--480}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_39}, doi = {10.1007/11506157\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiYZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WongC05, author = {C. K. Wong and Agnes Chan}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Immediate Data Authentication for Multicast in Resource Constrained Network}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {113--121}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_10}, doi = {10.1007/11506157\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WongC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangBD05, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Security Analysis and Fix of an Anonymous Credential System}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {537--547}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_45}, doi = {10.1007/11506157\_45}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YangBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangC05, author = {Bo{-}Yin Yang and Jiun{-}Ming Chen}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New {TTS}}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {518--531}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_43}, doi = {10.1007/11506157\_43}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangWD05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Deposit-Case Attack Against Secure Roaming}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {417--428}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_35}, doi = {10.1007/11506157\_35}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangWD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YaoPD05, author = {Ming Yao and Kun Peng and Ed Dawson}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {158--169}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_14}, doi = {10.1007/11506157\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YaoPD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2005, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137750}, doi = {10.1007/B137750}, isbn = {3-540-26547-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AndersonBDST04, author = {Erik Anderson and Cheryl L. Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {ManTiCore: Encryption with Joint Cipher-State Authentication}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {440--453}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_38}, doi = {10.1007/978-3-540-27800-9\_38}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AndersonBDST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Asano04, author = {Tomoyuki Asano}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {12--23}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_2}, doi = {10.1007/978-3-540-27800-9\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Asano04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AvoineV04, author = {Gildas Avoine and Serge Vaudenay}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {74--85}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_7}, doi = {10.1007/978-3-540-27800-9\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AvoineV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bao04, author = {Feng Bao}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Analysis of a Conference Scheme Under Active and Passive Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {157--163}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_14}, doi = {10.1007/978-3-540-27800-9\_14}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Bao04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaoWZZ04, author = {Feng Bao and Guilin Wang and Jianying Zhou and Huafei Zhu}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Analysis and Improvement of Micali's Fair Contract Signing Protocol}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {176--187}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_16}, doi = {10.1007/978-3-540-27800-9\_16}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaoWZZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Chang04, author = {Yan{-}Cheng Chang}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Single Database Private Information Retrieval with Logarithmic Communication}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {50--61}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_5}, doi = {10.1007/978-3-540-27800-9\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Chang04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CrispoPT04, author = {Bruno Crispo and Bogdan C. Popescu and Andrew S. Tanenbaum}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Symmetric Key Authentication Services Revisited}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {248--261}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_22}, doi = {10.1007/978-3-540-27800-9\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CrispoPT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GalbraithHS04, author = {Steven D. Galbraith and Herbie J. Hopkins and Igor E. Shparlinski}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Secure Bilinear Diffie-Hellman Bits}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {370--378}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_32}, doi = {10.1007/978-3-540-27800-9\_32}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GalbraithHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GiraudK04, author = {Christophe Giraud and Erik Woodward Knudsen}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Fault Attacks on Signature Schemes}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {478--491}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_41}, doi = {10.1007/978-3-540-27800-9\_41}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GiraudK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanLS04, author = {Dong{-}Guk Han and Jongin Lim and Kouichi Sakurai}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {On Security of {XTR} Public Key Cryptosystems Against Side Channel Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {454--465}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_39}, doi = {10.1007/978-3-540-27800-9\_39}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HanLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanaokaIMNOW04, author = {Goichiro Hanaoka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento and Akira Otsuka and Andreas J. Winter}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {62--73}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_6}, doi = {10.1007/978-3-540-27800-9\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanaokaIMNOW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangW04, author = {Zhenjie Huang and Yumin Wang}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Convertible Nominative Signatures}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {348--357}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_30}, doi = {10.1007/978-3-540-27800-9\_30}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HuangW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IwataK04, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {How to Re-use Round Function in Super-Pseudorandom Permutation}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {224--235}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_20}, doi = {10.1007/978-3-540-27800-9\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IwataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Jacobson04, author = {Michael J. Jacobson Jr.}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {149--156}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_13}, doi = {10.1007/978-3-540-27800-9\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Jacobson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimHL04, author = {Chong Hee Kim and Yong Ho Hwang and Pil Joong Lee}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {{TTS} without Revocation Capability Secure Against {CCA2}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {36--49}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_4}, doi = {10.1007/978-3-540-27800-9\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimKHLH04, author = {Jongsung Kim and Guil Kim and Seokhie Hong and Sangjin Lee and Dowon Hong}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {The Related-Key Rectangle Attack - Application to {SHACAL-1}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {123--136}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_11}, doi = {10.1007/978-3-540-27800-9\_11}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimKHLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KingR04, author = {Brian King and Ben Rubin}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Improvements to the Point Halving Algorithm}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {262--276}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_23}, doi = {10.1007/978-3-540-27800-9\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KingR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KoLHL04, author = {Youngdai Ko and Changhoon Lee and Seokhie Hong and Sangjin Lee}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Related Key Differential Cryptanalysis of Full-Round {SPECTR-H64} and {CIKS-1}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {137--148}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_12}, doi = {10.1007/978-3-540-27800-9\_12}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KoLHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaM04, author = {Kaoru Kurosawa and Toshihiko Matsuo}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {How to Remove {MAC} from {DHIES}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {236--247}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_21}, doi = {10.1007/978-3-540-27800-9\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeNSCLS04, author = {Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Pseudorandomness of SPN-Type Transformations}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {212--223}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_19}, doi = {10.1007/978-3-540-27800-9\_19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeNSCLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LenstraV04, author = {Arjen K. Lenstra and Tim Voss}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Information Security Risk Assessment, Aggregation, and Mitigation}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {391--401}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_34}, doi = {10.1007/978-3-540-27800-9\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LenstraV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lim04, author = {Chae Hoon Lim}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {289--300}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_25}, doi = {10.1007/978-3-540-27800-9\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lim04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuWW04, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {325--335}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_28}, doi = {10.1007/978-3-540-27800-9\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/McAvenSY04, author = {Luke McAven and Reihaneh Safavi{-}Naini and Moti Yung}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Unconditionally Secure Encryption Under Strong Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {427--439}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_37}, doi = {10.1007/978-3-540-27800-9\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/McAvenSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MinYK04, author = {SungJun Min and Go Yamamoto and Kwangjo Kim}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Weak Property of Malleability in NTRUSign}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {379--390}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_33}, doi = {10.1007/978-3-540-27800-9\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MinYK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakaharaPV04, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {The Biryukov-Demirci Attack on Reduced-Round Versions of {IDEA} and {MESH} Ciphers}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {98--109}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_9}, doi = {10.1007/978-3-540-27800-9\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakaharaPV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakanishiS04, author = {Toru Nakanishi and Yuji Sugiyama}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {336--347}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_29}, doi = {10.1007/978-3-540-27800-9\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakanishiS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OkeyaTV04, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {466--477}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_40}, doi = {10.1007/978-3-540-27800-9\_40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OkeyaTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PeinadoCEM04, author = {Marcus Peinado and Yuqun Chen and Paul England and John Manferdelli}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {{NGSCB:} {A} Trusted Open System}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {86--97}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_8}, doi = {10.1007/978-3-540-27800-9\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PeinadoCEM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RuanV04, author = {Chun Ruan and Vijay Varadharajan}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {A Weighted Graph Approach to Authorization Delegation and Conflict Resolution}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {402--413}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_35}, doi = {10.1007/978-3-540-27800-9\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RuanV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShaoquanG04, author = {Shaoquan Jiang and Guang Gong}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Multi-service Oriented Broadcast Encryption}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {1--11}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_1}, doi = {10.1007/978-3-540-27800-9\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShaoquanG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShinKKHL04, author = {YongSup Shin and Jongsung Kim and Guil Kim and Seokhie Hong and Sangjin Lee}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Differential-Linear Type Attacks on Reduced Rounds of {SHACAL-2}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {110--122}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_10}, doi = {10.1007/978-3-540-27800-9\_10}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShinKKHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloZM04, author = {Willy Susilo and Fangguo Zhang and Yi Mu}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Identity-Based Strong Designated Verifier Signature Schemes}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {313--324}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_27}, doi = {10.1007/978-3-540-27800-9\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SusiloZM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TinVBN04, author = {Yiu Shing Terry Tin and Harikrishna Vasanta and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Protocols with Security Proofs for Mobile Applications}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {358--369}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_31}, doi = {10.1007/978-3-540-27800-9\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TinVBN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ToS04, author = {Vu Dong T{\^{o}} and Reihaneh Safavi{-}Naini}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Linear Code Implies Public-Key Traitor Tracing with Revocation}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {24--35}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_3}, doi = {10.1007/978-3-540-27800-9\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ToS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Vaudenay04, author = {Serge Vaudenay}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in {ECDSA}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {188--199}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_17}, doi = {10.1007/978-3-540-27800-9\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Vaudenay04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WanW04, author = {Zhiguo Wan and Shuhong Wang}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Cryptanalysis of Two Password-Authenticated Key Exchange Protocols}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {164--175}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_15}, doi = {10.1007/978-3-540-27800-9\_15}, timestamp = {Sat, 14 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WanW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangC04, author = {Bo{-}Yin Yang and Jiun{-}Ming Chen}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Theoretical Analysis of {XL} over Small Fields}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {277--288}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_24}, doi = {10.1007/978-3-540-27800-9\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YaoHMFD04, author = {Ming Yao and Matthew Henricksen and Greg Maitland and Ernest Foo and Ed Dawson}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {A Mobile Agent System Providing Offer Privacy}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {301--312}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_26}, doi = {10.1007/978-3-540-27800-9\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YaoHMFD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YumL04, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Generic Construction of Certificateless Signature}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {200--211}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_18}, doi = {10.1007/978-3-540-27800-9\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YumL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhaoLCGS04, author = {Xibin Zhao and Kwok{-}Yan Lam and Siu Leung Chung and Ming Gu and Jia{-}Guang Sun}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {414--426}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_36}, doi = {10.1007/978-3-540-27800-9\_36}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhaoLCGS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2004, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98755}, doi = {10.1007/B98755}, isbn = {3-540-22379-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AbeI03, author = {Masayuki Abe and Hideki Imai}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Flaws in Some Robust Optimistic Mix-Nets}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {39--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_4}, doi = {10.1007/3-540-45067-X\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbeI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Arita03, author = {Seigo Arita}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Addition Algorithm in Jacobian of C\({}_{\mbox{34}}\) Curve}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {93--105}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_9}, doi = {10.1007/3-540-45067-X\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Arita03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bao03, author = {Feng Bao}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Cryptanalysis of a New Cellular Automata Cryptosystem}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {416--427}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_36}, doi = {10.1007/3-540-45067-X\_36}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Bao03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BullSNZ03, author = {Laurence Bull and David McG. Squire and Jan Newmarch and Yuliang Zheng}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Grouping Verifiable Content for Selective Disclosure}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {1--12}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_1}, doi = {10.1007/3-540-45067-X\_1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BullSNZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CanardT03, author = {S{\'{e}}bastien Canard and Jacques Traor{\'{e}}}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On Fair E-cash Systems Based on Group Signature Schemes}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {237--248}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_21}, doi = {10.1007/3-540-45067-X\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CanardT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenY03, author = {Chien{-}Ning Chen and Sung{-}Ming Yen}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Differential Fault Analysis on {AES} Key Schedule and Some Coutnermeasures}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {118--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_11}, doi = {10.1007/3-540-45067-X\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamgardJ03, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Length-Flexible Threshold Cryptosystem with Applications}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {350--364}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_30}, doi = {10.1007/3-540-45067-X\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DamgardJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DazaHS03, author = {Vanesa Daza and Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {464--475}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_40}, doi = {10.1007/3-540-45067-X\_40}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DazaHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Gong03, author = {Li Gong}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Is Cross-Platform Security Possible?}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {402}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_34}, doi = {10.1007/3-540-45067-X\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Gong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuPSLNS03, author = {Jabeom Gu and Sehyun Park and Ohyoung Song and Jaeil Lee and Jaehoon Nah and Sung Won Sohn}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Mobile {PKI:} {A} PKI-Based Authentication Framework for the Next Generation Mobile Communications}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {180--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_16}, doi = {10.1007/3-540-45067-X\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuPSLNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanCJPKR03, author = {Dong{-}Guk Han and Nam Su Chang and Seok Won Jung and Young{-}Ho Park and Chang Han Kim and Heuisu Ryu}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {67--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_7}, doi = {10.1007/3-540-45067-X\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HanCJPKR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanHHK03, author = {Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Key Recovery Attacks on {NTRU} without Ciphertext Validation Routine}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {274--284}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_24}, doi = {10.1007/3-540-45067-X\_24}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanHHK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanaokaOMOMOGNI03, author = {Goichiro Hanaoka and Kazuto Ogawa and Itsuro Murota and Go Ohtake and Keigo Majima and Kimiyuki Oyamada and Seiichi Gohshi and Seiichi Namba and Hideki Imai}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Separating Encryption and Key Issuance in Digital Rights Management Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {365--376}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_31}, doi = {10.1007/3-540-45067-X\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanaokaOMOMOGNI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HengK03, author = {Swee{-}Huay Heng and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Square Hash with a Small Key Size}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {522--531}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_45}, doi = {10.1007/3-540-45067-X\_45}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HengK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HitchcockMCD03, author = {Yvonne Hitchcock and Paul Montague and Gary Carter and Ed Dawson}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {The Security of Fixed versus Random Elliptic Curves in Cryptography}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {55--66}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_6}, doi = {10.1007/3-540-45067-X\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HitchcockMCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangKL03, author = {Yong Ho Hwang and Chong Hee Kim and Pil Joong Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {377--386}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_32}, doi = {10.1007/3-540-45067-X\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HwangKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangKLL03, author = {Jung Yeon Hwang and Hyun{-}Jeong Kim and Dong Hoon Lee and Jong In Lim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Digital Signature Schemes with Restriction on Signing Capability}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {324--335}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_28}, doi = {10.1007/3-540-45067-X\_28}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HwangKLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangYL03, author = {Yong Ho Hwang and Dae Hyun Yum and Pil Joong Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {{EPA:} An Efficient Password-Based Protocal for Authenticated Key Exchange}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {452--463}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_39}, doi = {10.1007/3-540-45067-X\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HwangYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IwataYK03, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Pseudorandomness of {KASUMI} Type Permutations}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {130--141}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_12}, doi = {10.1007/3-540-45067-X\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IwataYK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kanso03, author = {Ali Kanso}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Clock-Controlled Shrinking Generator of Feedback Shift Registers}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {443--451}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_38}, doi = {10.1007/3-540-45067-X\_38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kanso03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KawauchiT03, author = {Kei Kawauchi and Mitsuru Tada}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Extract Security of Multi-signature Schemes Based on {RSA}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {336--349}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_29}, doi = {10.1007/3-540-45067-X\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KawauchiT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KhooG03, author = {Khoongming Khoo and Guang Gong}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {New Constructions for Resilient and Highly Nonlinear Boolean Functions}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {498--509}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_43}, doi = {10.1007/3-540-45067-X\_43}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KhooG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimM03, author = {Hwankoo Kim and Sang{-}Jae Moon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {488--497}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_42}, doi = {10.1007/3-540-45067-X\_42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KitazawaSM03, author = {Shigeki Kitazawa and Masakazu Soshi and Atsuko Miyaji}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Evaluation of Anonymity of Practical Anonymous Communication Networks}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {13--26}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_2}, doi = {10.1007/3-540-45067-X\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KitazawaSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kwon03, author = {Taekyoung Kwon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Robust Software Tokens - Yet Another Method for Securing User's Digital Identity}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {476--487}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_41}, doi = {10.1007/3-540-45067-X\_41}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kwon03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsuoK03, author = {Toshihiko Matsuo and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On Parallel Hash Functions Based on Block-Cipher}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {510--521}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_44}, doi = {10.1007/3-540-45067-X\_44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsuoK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NarayananRK03, author = {Arvind Narayanan and C. Pandu Rangan and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Practical Pay {TV} Schemes}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {192--203}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_17}, doi = {10.1007/3-540-45067-X\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Odlyzko03, author = {Andrew M. Odlyzko}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {The Unsolvable Privacy Problem and Its Implications for Security Technologies}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {51--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_5}, doi = {10.1007/3-540-45067-X\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Odlyzko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PashalidisM03, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Taxonomy of Single Sign-On Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {249--264}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_22}, doi = {10.1007/3-540-45067-X\_22}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PashalidisM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengLR03, author = {Tao Peng and Christopher Leckie and Kotagiri Ramamohanarao}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {214--225}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_19}, doi = {10.1007/3-540-45067-X\_19}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengLR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Persiano03, author = {Pino Persiano and Ivan Visconti}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Anonymous Credential System and a Privacy-Aware {PKI}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {27--38}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_3}, doi = {10.1007/3-540-45067-X\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Persiano03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PieprzykP03, author = {Josef Pieprzyk and David Pointcheval}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Josef Pieprzyk, David Pointcheval}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {387--401}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_33}, doi = {10.1007/3-540-45067-X\_33}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PieprzykP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReidCHS03, author = {Jason Reid and Ian Cheong and Matthew Henricksen and Jason Smith}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Novel Use of {RBAC} to Protect Privacy in Distributed Health Care Information Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {403--415}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_35}, doi = {10.1007/3-540-45067-X\_35}, timestamp = {Wed, 22 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReidCHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SinghNLS03, author = {Abhishek Singh and Ola Nordstr{\"{o}}m and Chenghuai Lu and Andr{\'{e}} L. M. dos Santos}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Malicious {ICMP} Tunneling: Defense against the Vulnerability}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {226--235}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_20}, doi = {10.1007/3-540-45067-X\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SinghNLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SongK03, author = {Ha Yoon Song and Han{-}gyoo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Cooperative Routers against DoS Attacks}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {204--213}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_18}, doi = {10.1007/3-540-45067-X\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SongK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SungHL03, author = {Jaechul Sung and Deukjo Hong and Sangjin Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Key Recovery Attacks on the RMAC, TMAC, and {IACBC}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {265--273}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_23}, doi = {10.1007/3-540-45067-X\_23}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SungHL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakenakaSK03, author = {Masahiko Takenaka and Takeshi Shimoyama and Takeshi Koshiba}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Theoretical Analysis of chi\({}^{\mbox{2}}\) Attack on {RC6}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {142--153}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_13}, doi = {10.1007/3-540-45067-X\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TakenakaSK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TanYS03, author = {Chik How Tan and Xun Yi and Chee Kheong Siew}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A {CCA2} Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {428--442}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_37}, doi = {10.1007/3-540-45067-X\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TanYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TinBN03, author = {Yiu Shing Terry Tin and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {166--179}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_15}, doi = {10.1007/3-540-45067-X\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TinBN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangC03, author = {Libin Wang and Kefei Chen}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Typed Theory for Access Control and Information Flow Control in Mobile Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {154--165}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_14}, doi = {10.1007/3-540-45067-X\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03, author = {Andr{\'{e}} Weimerskirch and Douglas Stebila and Sheueling Chang Shantz}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {79--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_8}, doi = {10.1007/3-540-45067-X\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yen03, author = {Sung{-}Ming Yen}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {106--117}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_10}, doi = {10.1007/3-540-45067-X\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YenMH03, author = {Sung{-}Ming Yen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Permanent Fault Attack on the Parameters of {RSA} with {CRT}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {285--296}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_25}, doi = {10.1007/3-540-45067-X\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YenMH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoungY03, author = {Adam L. Young and Moti Yung}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {297--311}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_26}, doi = {10.1007/3-540-45067-X\_26}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YoungY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {312--323}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_27}, doi = {10.1007/3-540-45067-X\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2003, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X}, doi = {10.1007/3-540-45067-X}, isbn = {3-540-40515-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BarwickJMW02, author = {Susan G. Barwick and Wen{-}Ai Jackson and Keith M. Martin and Peter R. Wild}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Size of Broadcast in Threshold Schemes with Disenrollment}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {71--88}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_6}, doi = {10.1007/3-540-45450-0\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BarwickJMW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BennettGHP02, author = {Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Efficient Sharing of Encrypted Data}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {107--120}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_8}, doi = {10.1007/3-540-45450-0\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BennettGHP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BiehlT02, author = {Ingrid Biehl and Tsuyoshi Takagi}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A New Distributed Primality Test for Shared {RSA} Keys Using Quadratic Fields}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_1}, doi = {10.1007/3-540-45450-0\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BiehlT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChoieY02, author = {YoungJu Choie and D. Yun}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Isomorphism Classes of Hyperelliptic Curves of Genus 2 over F\({}_{\mbox{q}}\)}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {190--202}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_16}, doi = {10.1007/3-540-45450-0\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChoieY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ClarkDFGLMMS02, author = {Andrew J. Clark and Ed Dawson and Joanne Fuller and Jovan Dj. Golic and Hoon{-}Jae Lee and William Millan and Sang{-}Jae Moon and Leonie Simpson}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {The {LILI-II} Keystream Generator}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {25--39}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_3}, doi = {10.1007/3-540-45450-0\_3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ClarkDFGLMMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CubaleskaQS02, author = {Biljana Cubaleska and Weidong Qiu and Markus Schneider}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {How to Play Sherlock Holmes in the World of Mobile Agents}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {449--463}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_34}, doi = {10.1007/3-540-45450-0\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CubaleskaQS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EnglandP02, author = {Paul England and Marcus Peinado}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Authenticated Operation of Open Computing Devices}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {346--361}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_27}, doi = {10.1007/3-540-45450-0\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EnglandP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FischerS02, author = {Wieland Fischer and Jean{-}Pierre Seifert}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Note on Fast Computation of Secret {RSA} Exponents}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {136--143}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_10}, doi = {10.1007/3-540-45450-0\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FischerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanPPLLY02, author = {Dong{-}Guk Han and Hye{-}Young Park and Young{-}Ho Park and Sangjin Lee and Dong Hoon Lee and Hyungjin Yang}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A Practical Approach Defeating Blackmailing}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {464--481}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_35}, doi = {10.1007/3-540-45450-0\_35}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanPPLLY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HendersonCDO02, author = {Marie Henderson and Robert S. Coulter and Ed Dawson and Eiji Okamoto}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Modelling Trust Structures for Public Key Infrastructures}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {56--70}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_5}, doi = {10.1007/3-540-45450-0\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HendersonCDO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HitchcockM02, author = {Yvonne Hitchcock and Paul Montague}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {214--225}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_18}, doi = {10.1007/3-540-45450-0\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HitchcockM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HitchensVS02, author = {Michael Hitchens and Vijay Varadharajan and Gregory Saunders}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Policy Administration Domains}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {286--302}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_23}, doi = {10.1007/3-540-45450-0\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HitchensVS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Hughes02, author = {James P. Hughes}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A Linear Algebraic Attack on the {AAFG1} Braid Group Cryptosystem}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {176--189}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_15}, doi = {10.1007/3-540-45450-0\_15}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Hughes02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimK02, author = {Myungsun Kim and Kwangjo Kim}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {362--378}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_28}, doi = {10.1007/3-540-45450-0\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimLY02, author = {Hyun{-}Jeong Kim and Dong Hoon Lee and Moti Yung}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Privacy against Piracy: Protecting Two-Level Revocable {P-K} Traitor Tracing}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {482--496}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_36}, doi = {10.1007/3-540-45450-0\_36}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KimLY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/King02, author = {Brian King}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Requirements for Group Independent Linear Threshold Secret Sharing Schemes}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {89--106}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_7}, doi = {10.1007/3-540-45450-0\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/King02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KumarSR02, author = {M. V. N. Ashwin Kumar and K. Srinathan and C. Pandu Rangan}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {497--512}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_37}, doi = {10.1007/3-540-45450-0\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KumarSR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurnioSW02, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A Secure Re-keying Scheme with Key Recovery Property}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {40--55}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_4}, doi = {10.1007/3-540-45450-0\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurnioSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MayHMCD02, author = {Lauren May and Matthew Henricksen and William Millan and Gary Carter and Ed Dawson}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Strengthening the Key Schedule of the {AES}}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {226--240}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_19}, doi = {10.1007/3-540-45450-0\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MayHMCD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MuZV02, author = {Yi Mu and Junqi Zhang and Vijay Varadharajan}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {m out of n Oblivious Transfer}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {395--405}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_30}, doi = {10.1007/3-540-45450-0\_30}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MuZV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OkeyaS02, author = {Katsuyuki Okeya and Kouichi Sakurai}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {420--435}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_32}, doi = {10.1007/3-540-45450-0\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OkeyaS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ParkSCL02, author = {Sangwoo Park and Soo Hak Sung and Seongtaek Chee and Jongin Lim}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {On the Security of Reduced Versions of 3-Pass {HAVAL}}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {406--419}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_31}, doi = {10.1007/3-540-45450-0\_31}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ParkSCL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PieprzykZ02, author = {Josef Pieprzyk and Xian{-}Mo Zhang}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Cheating Prevention in Linear Secret Sharing}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {121--135}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_9}, doi = {10.1007/3-540-45450-0\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PieprzykZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReyzinR02, author = {Leonid Reyzin and Natan Reyzin}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {144--153}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_11}, doi = {10.1007/3-540-45450-0\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReyzinR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Roy02, author = {Bimal K. Roy}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A Brief Outline of Research on Correlation Immune Functions}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {379--394}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_29}, doi = {10.1007/3-540-45450-0\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Roy02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RuanV02, author = {Chun Ruan and Vijay Varadharajan}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Resolving Conflicts in Authorization Delegations}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {271--285}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_22}, doi = {10.1007/3-540-45450-0\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RuanV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakuraiT02, author = {Kouichi Sakurai and Tsuyoshi Takagi}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {On the Security of a Modified Paillier Public-Key Primitive}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {436--448}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_33}, doi = {10.1007/3-540-45450-0\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakuraiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SebeD02, author = {Francesc Seb{\'{e}} and Josep Domingo{-}Ferrer}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Short 3-Secure Fingerprinting Codes for Copyright Protection}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {316--327}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_25}, doi = {10.1007/3-540-45450-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SebeD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SolderaSQ02, author = {David Soldera and Jennifer Seberry and Chengxin Qu}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {The Analysis of Zheng-Seberry Scheme}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {159--168}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_13}, doi = {10.1007/3-540-45450-0\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SolderaSQ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SteinfeldBZ02, author = {Ron Steinfeld and Joonsang Baek and Yuliang Zheng}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {241--256}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_20}, doi = {10.1007/3-540-45450-0\_20}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SteinfeldBZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Tada02, author = {Mitsuru Tada}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {An Order-Specified Multisignature Scheme Secure against Active Insider Attacks}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {328--345}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_26}, doi = {10.1007/3-540-45450-0\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Tada02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WarrenB02, author = {Matthew J. Warren and Lynn Margaret Batten}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Security Management: An Information Systems Setting}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {257--270}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_21}, doi = {10.1007/3-540-45450-0\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WarrenB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Wu02, author = {Hongjun Wu}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Cryptanalysis of Stream Cipher Alpha1}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {169--175}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_14}, doi = {10.1007/3-540-45450-0\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Wu02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuB02, author = {Hongjun Wu and Feng Bao}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Cryptanalysis of Stream Cipher COS(2, 128) Mode {I}}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {154--158}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_12}, doi = {10.1007/3-540-45450-0\_12}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WuB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangBD02, author = {Yanjiang Yang and Feng Bao and Robert H. Deng}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Security Analysis and Improvement of the Global Key Recovery System}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {17--24}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_2}, doi = {10.1007/3-540-45450-0\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangBD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLK02, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {203--213}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_17}, doi = {10.1007/3-540-45450-0\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Zhou02, author = {Jianying Zhou}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Maintaining the Validity of Digital Signatures in {B2B} Applications}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {303--315}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_24}, doi = {10.1007/3-540-45450-0\_24}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Zhou02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2002, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0}, doi = {10.1007/3-540-45450-0}, isbn = {3-540-43861-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AnsperBSW01, author = {Arne Ansper and Ahto Buldas and M{\"{a}}rt Saarepera and Jan Willemson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Improving the Availability of Time-Stamping Services}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {360--375}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_29}, doi = {10.1007/3-540-47719-5\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AnsperBSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaoDFGW01, author = {Feng Bao and Robert H. Deng and Peirong Feng and Yan Guo and Hongjun Wu}, editor = {Vijay Varadharajan and Yi Mu}, title = {Secure and Private Distribution of Online Video and Some Related Cryptographic Issues}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {190--205}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_17}, doi = {10.1007/3-540-47719-5\_17}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaoDFGW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydMN01, author = {Colin Boyd and Paul Montague and Khanh Quoc Nguyen}, editor = {Vijay Varadharajan and Yi Mu}, title = {Elliptic Curve Based Password Authenticated Key Exchange Protocols}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {487--501}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_38}, doi = {10.1007/3-540-47719-5\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrincatM01, author = {Karl Brincat and Chris J. Mitchell}, editor = {Vijay Varadharajan and Yi Mu}, title = {New {CBC-MAC} Forgery Attacks}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {3--14}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_2}, doi = {10.1007/3-540-47719-5\_2}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrincatM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChiPJL01, author = {Sung{-}Do Chi and Jong Sou Park and Ki{-}Chan Jung and Jang{-}Se Lee}, editor = {Vijay Varadharajan and Yi Mu}, title = {Network Security Modeling and Cyber Attack Simulation Methodology}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {320--333}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_26}, doi = {10.1007/3-540-47719-5\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChiPJL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChoHOYHLPP01, author = {Eun{-}Sun Cho and Sunho Hong and Sechang Oh and Hongjin Yeh and Manpyo Hong and Cheol Won Lee and Hyundong Park and Chun{-}Sik Park}, editor = {Vijay Varadharajan and Yi Mu}, title = {{SKETHIC:} Secure Kernel Extension against Trojan Horses with Information-Carrying Codes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {177--189}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_16}, doi = {10.1007/3-540-47719-5\_16}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChoHOYHLPP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiP01, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Vijay Varadharajan and Yi Mu}, title = {Democratic Systems}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {392--402}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_31}, doi = {10.1007/3-540-47719-5\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GotoMSW01, author = {Hideaki Goto and Masahiro Mambo and Hiroki Shizuya and Yasuyoshi Watanabe}, editor = {Vijay Varadharajan and Yi Mu}, title = {Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {145--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_13}, doi = {10.1007/3-540-47719-5\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GotoMSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiroseY01, author = {Shoichi Hirose and Susumu Yoshida}, editor = {Vijay Varadharajan and Yi Mu}, title = {A User Authentication Scheme with Identity and Location Privacy}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {235--246}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_20}, doi = {10.1007/3-540-47719-5\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiroseY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ItoiAPR01, author = {Naomaru Itoi and William A. Arbaugh and Samuela J. Pollack and Daniel M. Reeves}, editor = {Vijay Varadharajan and Yi Mu}, title = {Personal Secure Booting}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {130--144}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_12}, doi = {10.1007/3-540-47719-5\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ItoiAPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JungKRW01, author = {Oliver Jung and Sven Kuhn and Christoph Ruland and Kai Wollenweber}, editor = {Vijay Varadharajan and Yi Mu}, title = {Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {344--359}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_28}, doi = {10.1007/3-540-47719-5\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JungKRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KangYHC01, author = {Ju{-}Sung Kang and Okyeon Yi and Dowon Hong and Hyun Sook Cho}, editor = {Vijay Varadharajan and Yi Mu}, title = {Pseudorandomness of MISTY-Type Transformations and the Block Cipher {KASUMI}}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {60--73}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_7}, doi = {10.1007/3-540-47719-5\_7}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KangYHC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimM01, author = {Hwankoo Kim and Sang{-}Jae Moon}, editor = {Vijay Varadharajan and Yi Mu}, title = {New Public-Key Cryptosystem Using Divisor Class Groups}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {74--83}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_8}, doi = {10.1007/3-540-47719-5\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/King01, author = {Brian King}, editor = {Vijay Varadharajan and Yi Mu}, title = {Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {376--391}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_30}, doi = {10.1007/3-540-47719-5\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/King01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeKK01, author = {Byoungcheon Lee and Heesun Kim and Kwangjo Kim}, editor = {Vijay Varadharajan and Yi Mu}, title = {Secure Mobile Agent Using Strong Non-designated Proxy Signature}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {474}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_37}, doi = {10.1007/3-540-47719-5\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeKK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lin01, author = {Along Lin}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Knowledge-Based Approach to Internet Authorizations}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {292--304}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_24}, doi = {10.1007/3-540-47719-5\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuOC01, author = {Chuchang Liu and Maris A. Ozols and Anthony Cant}, editor = {Vijay Varadharajan and Yi Mu}, title = {An Axiomatic Basis for Reasoning about Trust in PKIs}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {274--291}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_23}, doi = {10.1007/3-540-47719-5\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuOC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaedaMT01, author = {Ayako Maeda and Atsuko Miyaji and Mitsuru Tada}, editor = {Vijay Varadharajan and Yi Mu}, title = {Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {403--416}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_32}, doi = {10.1007/3-540-47719-5\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaedaMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MayMS01, author = {David May and Henk L. Muller and Nigel P. Smart}, editor = {Vijay Varadharajan and Yi Mu}, title = {Non-deterministic Processors}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {115--129}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_11}, doi = {10.1007/3-540-47719-5\_11}, timestamp = {Mon, 20 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MayMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MeyerNP01, author = {Andreas Meyer and Stefan Neis and Thomas Pfahler}, editor = {Vijay Varadharajan and Yi Mu}, title = {First Implementation of Cryptographic Protocols Based on Algebraic Number Fields}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {84--103}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_9}, doi = {10.1007/3-540-47719-5\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MeyerNP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakanishiS01, author = {Toru Nakanishi and Yuji Sugiyama}, editor = {Vijay Varadharajan and Yi Mu}, title = {Anonymous Statistical Survey of Attributes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {460--473}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_36}, doi = {10.1007/3-540-47719-5\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakanishiS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Neumann01, author = {B. Clifford Neuman}, editor = {Vijay Varadharajan and Yi Mu}, title = {Condition-Driven Integration of Security Services}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {176}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_15}, doi = {10.1007/3-540-47719-5\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Neumann01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OmoteM01, author = {Kazumasa Omote and Atsuko Miyaji}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Practical English Auction with One-Time Registration}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {221--234}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_19}, doi = {10.1007/3-540-47719-5\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OmoteM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ParkKBD01, author = {DongGook Park and JungJoon Kim and Colin Boyd and Ed Dawson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Cryptographic Salt: {A} Countermeasure against Denial-of-Service Attacks}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {334--343}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_27}, doi = {10.1007/3-540-47719-5\_27}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ParkKBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PavlovskiB01, author = {Chris Pavlovski and Colin Boyd}, editor = {Vijay Varadharajan and Yi Mu}, title = {Attacks Based on Small Factors in Various Group Structures}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {36--50}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_5}, doi = {10.1007/3-540-47719-5\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PavlovskiB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaeedniaSS01, author = {Shahrokh Saeednia and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Vijay Varadharajan and Yi Mu}, title = {On Classifying Conference Key Distribution Protocols}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {51--59}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_6}, doi = {10.1007/3-540-47719-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SaeedniaSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Safavi-NainiSW01, author = {Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Vijay Varadharajan and Yi Mu}, title = {How to Construct Fail-Stop Confirmer Signature Schemes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {435--444}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_34}, doi = {10.1007/3-540-47719-5\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Safavi-NainiSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Shim01, author = {Kyungah Shim}, editor = {Vijay Varadharajan and Yi Mu}, title = {Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {514--520}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_40}, doi = {10.1007/3-540-47719-5\_40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Shim01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/StinsonS01, author = {Douglas R. Stinson and Reto Strobl}, editor = {Vijay Varadharajan and Yi Mu}, title = {Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {417--434}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_33}, doi = {10.1007/3-540-47719-5\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/StinsonS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TanYS01, author = {Chik How Tan and Xun Yi and Chee Kheong Siew}, editor = {Vijay Varadharajan and Yi Mu}, title = {Signature Schemes Based on 3rd Order Shift Registers}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {445--459}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_35}, doi = {10.1007/3-540-47719-5\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TanYS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01, author = {Andr{\'{e}} Weimerskirch and Christof Paar and Sheueling Chang Shantz}, editor = {Vijay Varadharajan and Yi Mu}, title = {Elliptic Curve Cryptography on a Palm {OS} Device}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {502--513}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_39}, doi = {10.1007/3-540-47719-5\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WietrzykTV01, author = {Vlad Ingar Wietrzyk and Makoto Takizawa and Vijay Varadharajan}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Strategy for {MLS} Workflow}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {159--175}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_14}, doi = {10.1007/3-540-47719-5\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WietrzykTV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yacobi01, author = {Yacov Yacobi}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Few Thoughts on E-Commerce}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {1--2}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_1}, doi = {10.1007/3-540-47719-5\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yacobi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamuraI01, author = {Akihiro Yamamura and Hirokazu Ishizuka}, editor = {Vijay Varadharajan and Yi Mu}, title = {Error Detection and Authentication in Quantum Key Distribution}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {260--273}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_22}, doi = {10.1007/3-540-47719-5\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamuraI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamuraS01, author = {Akihiro Yamamura and Taiichi Saito}, editor = {Vijay Varadharajan and Yi Mu}, title = {Private Information Retrieval Based on the Subgroup Membership Problem}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {206--220}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_18}, doi = {10.1007/3-540-47719-5\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamuraS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangSR01, author = {Jong{-}Phil Yang and Weon Shin and Kyung Hyune Rhee}, editor = {Vijay Varadharajan and Yi Mu}, title = {An End-to-End Authentication Protocol in Wireless Application Protocol}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {247--259}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_21}, doi = {10.1007/3-540-47719-5\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangSR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yen01, author = {Sung{-}Ming Yen}, editor = {Vijay Varadharajan and Yi Mu}, title = {Practical Key Recovery Schemes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {104--114}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_10}, doi = {10.1007/3-540-47719-5\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YesbergH01, author = {John Yesberg and Marie Henderson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Applications of Trusted Review to Information Security}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {305--319}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_25}, doi = {10.1007/3-540-47719-5\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YesbergH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoussefG01, author = {Amr M. Youssef and Guang Gong}, editor = {Vijay Varadharajan and Yi Mu}, title = {Cryptanalysis of a Public Key Cryptosystem Proposed at {ACISP} 2000}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {15--20}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_3}, doi = {10.1007/3-540-47719-5\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YoussefG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZennerKL01, author = {Erik Zenner and Matthias Krause and Stefan Lucks}, editor = {Vijay Varadharajan and Yi Mu}, title = {Improved Cryptanalysis of the Self-Shrinking Generator}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {21--35}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_4}, doi = {10.1007/3-540-47719-5\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZennerKL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2001, editor = {Vijay Varadharajan and Yi Mu}, title = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5}, doi = {10.1007/3-540-47719-5}, isbn = {3-540-42300-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AbeK00, author = {Masayuki Abe and Masayuki Kanda}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {163--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_14}, doi = {10.1007/10718964\_14}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbeK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuLA00, author = {Richard Au and Mark Looi and Paul Ashley}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Towards a New Authorisation Paradigm for Extranets}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {18--29}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_2}, doi = {10.1007/10718964\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuLA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaekLK00, author = {Joonsang Baek and Byoungcheon Lee and Kwangjo Kim}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {49--58}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_5}, doi = {10.1007/10718964\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaekLK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BanksLS00, author = {William D. Banks and Daniel Lieman and Igor E. Shparlinski}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {An Extremely Small and Efficient Identification Scheme}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {378--384}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_31}, doi = {10.1007/10718964\_31}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BanksLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BlakleyB00, author = {Bob Blakley and G. R. Blakley}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {471--476}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_38}, doi = {10.1007/10718964\_38}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BlakleyB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BlakleyBK00, author = {G. R. Blakley and I. Borosh and Andreas Klappenecker}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Construction and Categories of Codes}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {266--277}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_22}, doi = {10.1007/10718964\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BlakleyBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrickellCF00, author = {Ernest F. Brickell and Giovanni Di Crescenzo and Yair Frankel}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Sharing Block Ciphers}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {457--470}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_37}, doi = {10.1007/10718964\_37}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrickellCF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Brown00, author = {Lawrie Brown}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Custom Safety Policies in Safe Erlang}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {30--40}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_3}, doi = {10.1007/10718964\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Brown00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ClarkJ00, author = {John A. Clark and Jeremy Jacob}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Two-Stage Optimisation in the Design of Boolean Functions}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {242--254}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_20}, doi = {10.1007/10718964\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ClarkJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DoiMO00, author = {Hiroshi Doi and Masahiro Mambo and Eiji Okamoto}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {On the Security of the RSA-Based Multisignature Scheme for Various Group Structures}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {352--367}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_29}, doi = {10.1007/10718964\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DoiMO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FergusonSW00, author = {Niels Ferguson and Bruce Schneier and David A. Wagner}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Security Weaknesses in a Randomized Stream Cipher}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {234--241}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_19}, doi = {10.1007/10718964\_19}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FergusonSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FooB00, author = {Ernest Foo and Colin Boyd}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Passive Entities: {A} Strategy for Electronic Payment Design}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {134--148}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_12}, doi = {10.1007/10718964\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FooB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GamageLZ00, author = {Chandana Gamage and Jussipekka Leiwo and Yuliang Zheng}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {High Performance Agile Crypto Modules}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {74--88}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_7}, doi = {10.1007/10718964\_7}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GamageLZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiP00, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Cheating Prevention in Secret Sharing}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {328--341}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_27}, doi = {10.1007/10718964\_27}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Golic00, author = {Jovan Dj. Golic}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Iterative Probabilistic Cryptanalysis of {RC4} Keystream Generator}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {220--233}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_18}, doi = {10.1007/10718964\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Golic00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuiT00, author = {Zhu Hui and Daniel T. H. Tan}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Novel Engine for Various Intrusion Detection Methods}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {255--265}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_21}, doi = {10.1007/10718964\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuiT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JosangPP00, author = {Audun J{\o}sang and Ingar Glenn Pedersen and Dean Povey}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {{PKI} Seeks a Trusting Relationship}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {191--205}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_16}, doi = {10.1007/10718964\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JosangPP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/King00, author = {Brian King}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Algorithms to Speed Up Computations in Threshold {RSA}}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {443--456}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_36}, doi = {10.1007/10718964\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/King00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KotzanikolaouBC00, author = {Panayiotis Kotzanikolaou and Mike Burmester and Vassilios Chrissikopoulos}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Secure Transactions with Mobile Agents in Hostile Environments}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {289--297}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_24}, doi = {10.1007/10718964\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/KotzanikolaouBC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurnioSSW00, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Key Management for Secure Multicast with Dynamic Controller}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {178--190}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_15}, doi = {10.1007/10718964\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurnioSSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeM00, author = {Kook{-}Heui Lee and Sang{-}Jae Moon}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {{AKA} Protocols for Mobile Communications}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {400--411}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_33}, doi = {10.1007/10718964\_33}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsuzakiAM00, author = {Natsume Matsuzaki and Jun Anzai and Tsutomu Matsumoto}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Light Weight Broadcast Exclusion Using Secret Sharing}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {313--327}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_26}, doi = {10.1007/10718964\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsuzakiAM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MayPC00, author = {Lauren May and Lyta Penna and Andrew J. Clark}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {An Implementation of Bitsliced {DES} on the Pentium MMX\({}^{\mbox{TM}}\) Processor}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {112--122}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_10}, doi = {10.1007/10718964\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MayPC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MitomiM00, author = {Shirow Mitomi and Atsuko Miyaji}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {298--312}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_25}, doi = {10.1007/10718964\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MitomiM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MuV00, author = {Yi Mu and Vijay Varadharajan}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Fail-Stop Confirmer Signatures}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {368--377}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_30}, doi = {10.1007/10718964\_30}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MuV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenT00, author = {Khanh Quoc Nguyen and Jacques Traor{\'{e}}}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {An Online Public Auction Protocol Protecting Bidder Privacy}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {427--442}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_35}, doi = {10.1007/10718964\_35}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NietoVBD00, author = {Juanma Gonz{\'{a}}lez Nieto and Kapali Viswanathan and Colin Boyd and Ed Dawson}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Key Recovery System for the Commercial Environment}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {149--162}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_13}, doi = {10.1007/10718964\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NietoVBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OzolsHLC00, author = {Maris A. Ozols and Marie Henderson and Chuchang Liu and Anthony Cant}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {The {PKI} Specification Dilemma: {A} Formal Solution}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {206--219}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_17}, doi = {10.1007/10718964\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OzolsHLC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PrasetijoALCG00, author = {Agung Budi Prasetijo and Paul Ashley and Mark Looi and Andrew J. Clark and Gary Gaskell}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Three-Party {HTTP} Proxy to Support Internet Content Regulation}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {89--96}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_8}, doi = {10.1007/10718964\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PrasetijoALCG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakaiS00, author = {Yasuyuki Sakai and Kouichi Sakurai}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {59--73}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_6}, doi = {10.1007/10718964\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakaiS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakuraiM00, author = {Kouichi Sakurai and Shingo Miyazaki}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {385--399}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_32}, doi = {10.1007/10718964\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakuraiM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SklavosVP00, author = {Panagiotis Sklavos and Angelos P. Varvitsiotis and Despina Polemi}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Securing Large E-Commerce Networks}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {123--133}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_11}, doi = {10.1007/10718964\_11}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SklavosVP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SpalkaCL00, author = {Adrian Spalka and Armin B. Cremers and Hartmut Lehmler}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {1--17}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_1}, doi = {10.1007/10718964\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SpalkaCL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Underwood00, author = {Alan Underwood}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {477--486}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_39}, doi = {10.1007/10718964\_39}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Underwood00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ViswanathanBD00, author = {Kapali Viswanathan and Colin Boyd and Ed Dawson}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Three Phased Schema for Sealed Bid Auction System Design}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {412--426}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_34}, doi = {10.1007/10718964\_34}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ViswanathanBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangLXZ00, author = {Huaxiong Wang and Kwok{-}Yan Lam and Guozhen Xiao and Huanhui Zhao}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {On Multiplicative Secret Sharing Schemes}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {342--351}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_28}, doi = {10.1007/10718964\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangLXZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuBYD00, author = {Hongjun Wu and Feng Bao and Dingfeng Ye and Robert H. Deng}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Cryptanalysis of the \emph{m}-Permutation Protection Schemes}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {97--111}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_9}, doi = {10.1007/10718964\_9}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WuBYD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuBYD00a, author = {Hongjun Wu and Feng Bao and Dingfeng Ye and Robert H. Deng}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Cryptanalysis of Polynominal Authentication and Signature Scheme}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {278--288}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_23}, doi = {10.1007/10718964\_23}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WuBYD00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YooHLLYS00, author = {Heajoung Yoo and Seokhie Hong and Sangjin Lee and Jong In Lim and Okyeon Yi and Maenghee Sung}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {41--48}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_4}, doi = {10.1007/10718964\_4}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YooHLLYS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2000, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964}, doi = {10.1007/10718964}, isbn = {3-540-67742-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AshleyBV99, author = {Paul Ashley and Bradley Broom and Mark Vandenwauver}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Implementation of a Secure Version of {NFS} Including {RBAC}}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {213--227}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_18}, doi = {10.1007/3-540-48970-3\_18}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AshleyBV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiV99, author = {Yun Bai and Vijay Varadharajan}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Authorization in Object Oriented Databases}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {270--280}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_22}, doi = {10.1007/3-540-48970-3\_22}, timestamp = {Thu, 29 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydFP99, author = {Colin Boyd and Ernest Foo and Chris Pavlovski}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient Electronic Cash Using Batch Signatures}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {244--257}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_20}, doi = {10.1007/3-540-48970-3\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydFP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FungG99, author = {Wai W. Fung and James W. Gray III}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On \emph{m}-Permutation Protection Scheme Against Modification Attack}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {77--87}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_7}, doi = {10.1007/3-540-48970-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FungG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiP99, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {129--134}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_11}, doi = {10.1007/3-540-48970-3\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GolicCD99, author = {Jovan Dj. Golic and Andrew J. Clark and Ed Dawson}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Inversion Attack and Branching}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {88--102}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_8}, doi = {10.1007/3-540-48970-3\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GolicCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GysinS99, author = {Marc Gysin and Jennifer Seberry}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Generalised Cycling Attacks on {RSA} and Strong {RSA} Primes}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {149--163}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_13}, doi = {10.1007/3-540-48970-3\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GysinS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HortonS99, author = {Jeffrey Horton and Jennifer Seberry}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Companion Viruses and the Macintosh: Threats and Countermeasures}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {202--212}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_17}, doi = {10.1007/3-540-48970-3\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HortonS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeHYC99, author = {Seungwon Lee and Seong{-}Min Hong and Hyunsoo Yoon and Yookun Cho}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Accelerating Key Establishment Protocols for Mobile Communication}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {51--63}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_5}, doi = {10.1007/3-540-48970-3\_5}, timestamp = {Thu, 06 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeHYC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lenstra99, author = {Arjen K. Lenstra}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {294--302}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_24}, doi = {10.1007/3-540-48970-3\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lenstra99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiP99, author = {Chih{-}Hung Li and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Conference Key Agreement from Secret Sharing}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {64--76}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_6}, doi = {10.1007/3-540-48970-3\_6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaitraS99, author = {Subhamoy Maitra and Palash Sarkar}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Enumeration of Correlation Immune Boolean Functions}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {12--25}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_2}, doi = {10.1007/3-540-48970-3\_2}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaitraS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MartinPSW99, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Changing Thresholds in the Absence of Secure Channels}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {177--191}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_15}, doi = {10.1007/3-540-48970-3\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MartinPSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MillanCD99, author = {William Millan and Andrew J. Clark and Ed Dawson}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Boolean Function Design Using Hill Climbing Methods}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {1--11}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_1}, doi = {10.1007/3-540-48970-3\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MillanCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Muller99, author = {Siguna M{\"{u}}ller}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Security of an {RSA} Based Encryption Scheme}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {135--148}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_12}, doi = {10.1007/3-540-48970-3\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Muller99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenMV99, author = {Khanh Quoc Nguyen and Yi Mu and Vijay Varadharajan}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {117--128}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_10}, doi = {10.1007/3-540-48970-3\_10}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenMV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PeiLWS99, author = {Dingyi Pei and Yuqiang Li and Yejing Wang and Reihaneh Safavi{-}Naini}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Characterization of Optimal Authentication Codes with Arbitration}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {303--313}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_25}, doi = {10.1007/3-540-48970-3\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PeiLWS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QuSP99, author = {Chengxin Qu and Jennifer Seberry and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Symmetric Property of Homogeneous Boolean Functions}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {26--35}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_3}, doi = {10.1007/3-540-48970-3\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/QuSP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaeedniaG99, author = {Shahrokh Saeednia and Hossein Ghodosi}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Self-Certified Group-Oriented Cryptosystem Without a Combiner}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {192--201}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_16}, doi = {10.1007/3-540-48970-3\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SaeedniaG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaundersHV99, author = {Gregory Saunders and Michael Hitchens and Vijay Varadharajan}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Analysis of Access Control Models}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {281--293}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_23}, doi = {10.1007/3-540-48970-3\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SaundersHV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloSP99, author = {Willy Susilo and Reihaneh Safavi{-}Naini and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Fail-Stop Threshold Signature Schemes Based on Elliptic Curves}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {103--116}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_9}, doi = {10.1007/3-540-48970-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SusiloSP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TiountchikT99, author = {Alexander Tiountchik and Elena Trichina}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {{RSA} Acceleration with Field Programmable Gate Arrays}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {164--176}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_14}, doi = {10.1007/3-540-48970-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TiountchikT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Traore99, author = {Jacques Traor{\'{e}}}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {228--243}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_19}, doi = {10.1007/3-540-48970-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Traore99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ViswanathanBD99, author = {Kapali Viswanathan and Colin Boyd and Ed Dawson}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Publicly Verifiable Key Escrow with Limited Time Span}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {36--50}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_4}, doi = {10.1007/3-540-48970-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ViswanathanBD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yamamura99, author = {Akihiro Yamamura}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Functional Cryptosystem Using a Group Action}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {314--325}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_26}, doi = {10.1007/3-540-48970-3\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yamamura99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhouDB99, author = {Jianying Zhou and Robert H. Deng and Feng Bao}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Evolution of Fair Non-repudiation with {TTP}}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {258--269}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_21}, doi = {10.1007/3-540-48970-3\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhouDB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/1999, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3}, doi = {10.1007/3-540-48970-3}, isbn = {3-540-65756-8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AshleyVB98, author = {Paul Ashley and Mark Vandenwauver and Bradley Broom}, editor = {Colin Boyd and Ed Dawson}, title = {A Uniform Approach to Securing Unix Applications Using {SESAME}}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {24--35}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053718}, doi = {10.1007/BFB0053718}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AshleyVB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Aura98, author = {Tuomas Aura}, editor = {Colin Boyd and Ed Dawson}, title = {Fast Access Control Decisions from Delegation Certificate Databases}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {284--295}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053741}, doi = {10.1007/BFB0053741}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Aura98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiV98, author = {Yun Bai and Vijay Varadharajan}, editor = {Colin Boyd and Ed Dawson}, title = {A High Level Language for Conventional Access Control Models}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {273--283}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053740}, doi = {10.1007/BFB0053740}, timestamp = {Thu, 29 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BlumenthalHR98, author = {Uri Blumenthal and Nguyen C. Hien and J. H. Rooney}, editor = {Colin Boyd and Ed Dawson}, title = {Low-Cost Secure Server Connection with Limited-Privilege Clients}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {90--98}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053724}, doi = {10.1007/BFB0053724}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BlumenthalHR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydM98, author = {Colin Boyd and Anish Mathuria}, editor = {Colin Boyd and Ed Dawson}, title = {Key Establishment Protocols for Secure Mobile Communications: {A} Selective Survey}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {344--355}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053746}, doi = {10.1007/BFB0053746}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CarterDN98, author = {Gary Carter and Ed Dawson and Lauren Nielsen}, editor = {Colin Boyd and Ed Dawson}, title = {Key Schedules of Iterative Block Ciphers}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {80--89}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053723}, doi = {10.1007/BFB0053723}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CarterDN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenH98, author = {Mark Chen and Eric Hughes}, editor = {Colin Boyd and Ed Dawson}, title = {Protocol Failures Related to Order of Encryption and Signature}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {238--249}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053737}, doi = {10.1007/BFB0053737}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DesmedtKKK98, author = {Yvo Desmedt and Brian King and Wataru Kishimoto and Kaoru Kurosawa}, editor = {Colin Boyd and Ed Dawson}, title = {A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {391--402}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053750}, doi = {10.1007/BFB0053750}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DesmedtKKK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FalkT98, author = {Rainer Falk and Markus Trommer}, editor = {Colin Boyd and Ed Dawson}, title = {Integrated Management of Network and Host Based Security Mechanisms}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {36--47}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053719}, doi = {10.1007/BFB0053719}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FalkT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FranzGJP98, author = {Elke Franz and A. Graubner and Anja Jerichow and Andreas Pfitzmann}, editor = {Colin Boyd and Ed Dawson}, title = {Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {111--122}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053726}, doi = {10.1007/BFB0053726}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FranzGJP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FungG98, author = {Wai W. Fung and James W. Gray III}, editor = {Colin Boyd and Ed Dawson}, title = {Protection Against {EEPROM} Modification Attacks}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {250--260}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053738}, doi = {10.1007/BFB0053738}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FungG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiPS98, author = {Hossein Ghodosi and Josef Pieprzyk and Reihaneh Safavi{-}Naini}, editor = {Colin Boyd and Ed Dawson}, title = {Secret Sharing in Multilevel and Compartmented Groups}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {367--378}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053748}, doi = {10.1007/BFB0053748}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiPS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiPSW98, author = {Hossein Ghodosi and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Colin Boyd and Ed Dawson}, title = {On Construction of Cumulative Secret Sharing Schemes}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {379--390}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053749}, doi = {10.1007/BFB0053749}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiPSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GolicM98, author = {Jovan Dj. Golic and Renato Menicocci}, editor = {Colin Boyd and Ed Dawson}, title = {Correlation Attacks on Up/Down Cascades}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {123--134}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053727}, doi = {10.1007/BFB0053727}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GolicM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanaokaZI98, author = {Goichiro Hanaoka and Yuliang Zheng and Hideki Imai}, editor = {Colin Boyd and Ed Dawson}, title = {{LITESET:} {A} Light-Weight Secure Electronic Transaction Protocol}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {215--226}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053735}, doi = {10.1007/BFB0053735}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HanaokaZI98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HeSS98, author = {Qi He and Katia P. Sycara and Zhongmin Su}, editor = {Colin Boyd and Ed Dawson}, title = {A Solution to Open Standard of {PKI}}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {99--110}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053725}, doi = {10.1007/BFB0053725}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HeSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Henderson98, author = {Marie Henderson}, editor = {Colin Boyd and Ed Dawson}, title = {Applications of Linearised and Sub-linearised Polynomials to Information Security}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {227--237}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053736}, doi = {10.1007/BFB0053736}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Henderson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HortonS98, author = {Jeffrey Horton and Jennifer Seberry}, editor = {Colin Boyd and Ed Dawson}, title = {Covert Distributed Computing Using Java Through Web Spoofing}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {48--57}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053720}, doi = {10.1007/BFB0053720}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HortonS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Hruby98, author = {Jaroslav Hruby}, editor = {Colin Boyd and Ed Dawson}, title = {Trends in Quantum Cryptography in Czech Republic}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {261--272}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053739}, doi = {10.1007/BFB0053739}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Hruby98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kaijser98, author = {Per Kaijser}, editor = {Colin Boyd and Ed Dawson}, title = {A Review of the {SESAME} Development}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {1--8}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053716}, doi = {10.1007/BFB0053716}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kaijser98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KaksonenM98, author = {Rauli Kaksonen and Petri M{\"{a}}h{\"{o}}nen}, editor = {Colin Boyd and Ed Dawson}, title = {Object Modeling of Cryptographic Algorithms with {UML}}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {193--204}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053733}, doi = {10.1007/BFB0053733}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KaksonenM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeHW98, author = {Narn{-}Yih Lee and Tzonelih Hwang and Chih{-}Hung Wang}, editor = {Colin Boyd and Ed Dawson}, title = {On Zhang's Nonrepudiable Proxy Signature Schemes}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {415--422}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053752}, doi = {10.1007/BFB0053752}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeHW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ManningerS98, author = {Martin Manninger and Robert Schischka}, editor = {Colin Boyd and Ed Dawson}, title = {Adapting an Electronic Purse for Internet Payments}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {205--214}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053734}, doi = {10.1007/BFB0053734}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ManningerS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Millan98, author = {William Millan}, editor = {Colin Boyd and Ed Dawson}, title = {How to Improve the Nonlinearity of Bijective S-Boxes}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {181--192}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053732}, doi = {10.1007/BFB0053732}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Millan98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MullerM98, author = {Siguna M{\"{u}}ller and Winfried B. M{\"{u}}ller}, editor = {Colin Boyd and Ed Dawson}, title = {The Security of Public Key Cryptosystems Based on Integer Factorization}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {9--23}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053717}, doi = {10.1007/BFB0053717}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MullerM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PieprzykQ98, author = {Josef Pieprzyk and Cheng Xin Qu}, editor = {Colin Boyd and Ed Dawson}, title = {Rotation-Symmetric Functions and Fast Hashing}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {169--180}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053731}, doi = {10.1007/BFB0053731}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PieprzykQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/RiechmannK98, author = {Thomas Riechmann and J{\"{u}}rgen Klein{\"{o}}der}, editor = {Colin Boyd and Ed Dawson}, title = {Meta Objects for Access Control: Role-Based Principals}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {296--307}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053742}, doi = {10.1007/BFB0053742}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/RiechmannK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Rose98, author = {Gregory G. Rose}, editor = {Colin Boyd and Ed Dawson}, title = {A Stream Cipher Based on Linear Feedback over GF(2\({}^{\mbox{8}}\))}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {135--146}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053728}, doi = {10.1007/BFB0053728}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Rose98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Rudolph98, author = {Carsten Rudolph}, editor = {Colin Boyd and Ed Dawson}, title = {A Formal Model for Systematic Design of Key Establishment Protocols}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {332--343}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053745}, doi = {10.1007/BFB0053745}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Rudolph98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaeedniaS98, author = {Shahrokh Saeednia and Reihaneh Safavi{-}Naini}, editor = {Colin Boyd and Ed Dawson}, title = {Efficient Identity-Based Conference Key Distribution Protocols}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {320--331}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053744}, doi = {10.1007/BFB0053744}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SaeedniaS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Safavi-NainiW98, author = {Reihaneh Safavi{-}Naini and Yejing Wang}, editor = {Colin Boyd and Ed Dawson}, title = {Bounds and Constructions for A\({}^{\mbox{3}}\)-code with Multi-senders}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {159--168}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053730}, doi = {10.1007/BFB0053730}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Safavi-NainiW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SimpsonGD98, author = {Leonie Simpson and Jovan Dj. Golic and Ed Dawson}, editor = {Colin Boyd and Ed Dawson}, title = {A Probabilistic Correlation Attack on the Shrinking Generator}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {147--158}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053729}, doi = {10.1007/BFB0053729}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SimpsonGD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Stabell-KuloHD98, author = {Tage Stabell{-}Kul{\o} and Arne Helme and Gianluca Dini}, editor = {Colin Boyd and Ed Dawson}, title = {Detecting Key-Dependencies}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {356--366}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053747}, doi = {10.1007/BFB0053747}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Stabell-KuloHD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunS98, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, editor = {Colin Boyd and Ed Dawson}, title = {On Private-Key Cryptosystems Based on Product Codes}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {68--79}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053722}, doi = {10.1007/BFB0053722}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SyukriOM98, author = {Agus Fanar Syukri and Eiji Okamoto and Masahiro Mambo}, editor = {Colin Boyd and Ed Dawson}, title = {A User Identification System Using Signature Written with Mouse}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {403--414}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053751}, doi = {10.1007/BFB0053751}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SyukriOM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TidswellP98, author = {Jonathon Tidswell and John Potter}, editor = {Colin Boyd and Ed Dawson}, title = {A Dynamically Typed Access Control Model}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {308--319}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053743}, doi = {10.1007/BFB0053743}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TidswellP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YiLH98, author = {Xun Yi and Kwok{-}Yan Lam and Yongfei Han}, editor = {Colin Boyd and Ed Dawson}, title = {Differential Cryptanalysis of a Block Cipher}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {58--67}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053721}, doi = {10.1007/BFB0053721}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YiLH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/1998, editor = {Colin Boyd and Ed Dawson}, title = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053715}, doi = {10.1007/BFB0053715}, isbn = {3-540-64732-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AbeFK97, author = {Takehito Abe and Hiroshi Fujii and Kazuhiko Kushima}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Image Distribution Method with Embedded Identifier Scheme for Copyright Protection}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {325--336}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027940}, doi = {10.1007/BFB0027940}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbeFK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiV97, author = {Yun Bai and Vijay Varadharajan}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Analysis and Implementation of a Formal Authorisation Policy Design Approach}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {14--25}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027939}, doi = {10.1007/BFB0027939}, timestamp = {Thu, 29 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BakhtiariSP97, author = {Shahram Bakhtiari and Reihaneh Safavi{-}Naini and Josef Pieprzyk}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {A Message Authentication Code Based on Latin Squares}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {194--203}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027926}, doi = {10.1007/BFB0027926}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BakhtiariSP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaoDJ97, author = {Feng Bao and Robert H. Deng and Yongfei Han and Albert B. Jeng}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {261--270}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027933}, doi = {10.1007/BFB0027933}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaoDJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Boyd97, author = {Colin Boyd}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {On Key Agreement and Conference Key Agreement}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {294--302}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027936}, doi = {10.1007/BFB0027936}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Boyd97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenGMW97, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell and Peter R. Wild}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Secret Sharing with Reusable Polynomials}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {183--193}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027925}, doi = {10.1007/BFB0027925}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenGMW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.