Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2001.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/AnsperBSW01,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  M{\"{a}}rt Saarepera and
                  Jan Willemson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Improving the Availability of Time-Stamping Services},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {360--375},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_29},
  doi          = {10.1007/3-540-47719-5\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AnsperBSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoDFGW01,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Peirong Feng and
                  Yan Guo and
                  Hongjun Wu},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Secure and Private Distribution of Online Video and Some Related Cryptographic
                  Issues},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_17},
  doi          = {10.1007/3-540-47719-5\_17},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaoDFGW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydMN01,
  author       = {Colin Boyd and
                  Paul Montague and
                  Khanh Quoc Nguyen},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Elliptic Curve Based Password Authenticated Key Exchange Protocols},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {487--501},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_38},
  doi          = {10.1007/3-540-47719-5\_38},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrincatM01,
  author       = {Karl Brincat and
                  Chris J. Mitchell},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {New {CBC-MAC} Forgery Attacks},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_2},
  doi          = {10.1007/3-540-47719-5\_2},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrincatM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChiPJL01,
  author       = {Sung{-}Do Chi and
                  Jong Sou Park and
                  Ki{-}Chan Jung and
                  Jang{-}Se Lee},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Network Security Modeling and Cyber Attack Simulation Methodology},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_26},
  doi          = {10.1007/3-540-47719-5\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChiPJL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChoHOYHLPP01,
  author       = {Eun{-}Sun Cho and
                  Sunho Hong and
                  Sechang Oh and
                  Hongjin Yeh and
                  Manpyo Hong and
                  Cheol Won Lee and
                  Hyundong Park and
                  Chun{-}Sik Park},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {{SKETHIC:} Secure Kernel Extension against Trojan Horses with Information-Carrying
                  Codes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {177--189},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_16},
  doi          = {10.1007/3-540-47719-5\_16},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChoHOYHLPP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiP01,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Democratic Systems},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {392--402},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_31},
  doi          = {10.1007/3-540-47719-5\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GotoMSW01,
  author       = {Hideaki Goto and
                  Masahiro Mambo and
                  Hiroki Shizuya and
                  Yasuyoshi Watanabe},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Evaluation of Tamper-Resistant Software Deviating from Structured
                  Programming Rules},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_13},
  doi          = {10.1007/3-540-47719-5\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GotoMSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiroseY01,
  author       = {Shoichi Hirose and
                  Susumu Yoshida},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A User Authentication Scheme with Identity and Location Privacy},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_20},
  doi          = {10.1007/3-540-47719-5\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiroseY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ItoiAPR01,
  author       = {Naomaru Itoi and
                  William A. Arbaugh and
                  Samuela J. Pollack and
                  Daniel M. Reeves},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Personal Secure Booting},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_12},
  doi          = {10.1007/3-540-47719-5\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ItoiAPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JungKRW01,
  author       = {Oliver Jung and
                  Sven Kuhn and
                  Christoph Ruland and
                  Kai Wollenweber},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Enhanced Modes of Operation for the Encryption in High-Speed Networks
                  and Their Impact on QoS},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {344--359},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_28},
  doi          = {10.1007/3-540-47719-5\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JungKRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KangYHC01,
  author       = {Ju{-}Sung Kang and
                  Okyeon Yi and
                  Dowon Hong and
                  Hyun Sook Cho},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Pseudorandomness of MISTY-Type Transformations and the Block Cipher
                  {KASUMI}},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {60--73},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_7},
  doi          = {10.1007/3-540-47719-5\_7},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KangYHC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimM01,
  author       = {Hwankoo Kim and
                  Sang{-}Jae Moon},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {New Public-Key Cryptosystem Using Divisor Class Groups},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_8},
  doi          = {10.1007/3-540-47719-5\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/King01,
  author       = {Brian King},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Randomness Required for Linear Threshold Sharing Schemes Defined over
                  Any Finite Abelian Group},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {376--391},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_30},
  doi          = {10.1007/3-540-47719-5\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/King01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeKK01,
  author       = {Byoungcheon Lee and
                  Heesun Kim and
                  Kwangjo Kim},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Secure Mobile Agent Using Strong Non-designated Proxy Signature},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {474},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_37},
  doi          = {10.1007/3-540-47719-5\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeKK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lin01,
  author       = {Along Lin},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Knowledge-Based Approach to Internet Authorizations},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_24},
  doi          = {10.1007/3-540-47719-5\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuOC01,
  author       = {Chuchang Liu and
                  Maris A. Ozols and
                  Anthony Cant},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {An Axiomatic Basis for Reasoning about Trust in PKIs},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_23},
  doi          = {10.1007/3-540-47719-5\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuOC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaedaMT01,
  author       = {Ayako Maeda and
                  Atsuko Miyaji and
                  Mitsuru Tada},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Efficient and Unconditionally Secure Verifiable Threshold Changeable
                  Scheme},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_32},
  doi          = {10.1007/3-540-47719-5\_32},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaedaMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MayMS01,
  author       = {David May and
                  Henk L. Muller and
                  Nigel P. Smart},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Non-deterministic Processors},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_11},
  doi          = {10.1007/3-540-47719-5\_11},
  timestamp    = {Mon, 20 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MayMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MeyerNP01,
  author       = {Andreas Meyer and
                  Stefan Neis and
                  Thomas Pfahler},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {First Implementation of Cryptographic Protocols Based on Algebraic
                  Number Fields},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_9},
  doi          = {10.1007/3-540-47719-5\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MeyerNP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakanishiS01,
  author       = {Toru Nakanishi and
                  Yuji Sugiyama},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Anonymous Statistical Survey of Attributes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {460--473},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_36},
  doi          = {10.1007/3-540-47719-5\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakanishiS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Neumann01,
  author       = {B. Clifford Neuman},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Condition-Driven Integration of Security Services},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {176},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_15},
  doi          = {10.1007/3-540-47719-5\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Neumann01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OmoteM01,
  author       = {Kazumasa Omote and
                  Atsuko Miyaji},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Practical English Auction with One-Time Registration},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_19},
  doi          = {10.1007/3-540-47719-5\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OmoteM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ParkKBD01,
  author       = {DongGook Park and
                  JungJoon Kim and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Cryptographic Salt: {A} Countermeasure against Denial-of-Service Attacks},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {334--343},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_27},
  doi          = {10.1007/3-540-47719-5\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ParkKBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PavlovskiB01,
  author       = {Chris Pavlovski and
                  Colin Boyd},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Attacks Based on Small Factors in Various Group Structures},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_5},
  doi          = {10.1007/3-540-47719-5\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PavlovskiB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaeedniaSS01,
  author       = {Shahrokh Saeednia and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {On Classifying Conference Key Distribution Protocols},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {51--59},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_6},
  doi          = {10.1007/3-540-47719-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SaeedniaSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Safavi-NainiSW01,
  author       = {Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {How to Construct Fail-Stop Confirmer Signature Schemes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {435--444},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_34},
  doi          = {10.1007/3-540-47719-5\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Safavi-NainiSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Shim01,
  author       = {Kyungah Shim},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms
                  in a Finite Field},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {514--520},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_40},
  doi          = {10.1007/3-540-47719-5\_40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Shim01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StinsonS01,
  author       = {Douglas R. Stinson and
                  Reto Strobl},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold
                  Scheme for Implicit Certificates},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_33},
  doi          = {10.1007/3-540-47719-5\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/StinsonS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TanYS01,
  author       = {Chik How Tan and
                  Xun Yi and
                  Chee Kheong Siew},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Signature Schemes Based on 3rd Order Shift Registers},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {445--459},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_35},
  doi          = {10.1007/3-540-47719-5\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TanYS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar and
                  Sheueling Chang Shantz},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Elliptic Curve Cryptography on a Palm {OS} Device},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {502--513},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_39},
  doi          = {10.1007/3-540-47719-5\_39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WietrzykTV01,
  author       = {Vlad Ingar Wietrzyk and
                  Makoto Takizawa and
                  Vijay Varadharajan},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Strategy for {MLS} Workflow},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_14},
  doi          = {10.1007/3-540-47719-5\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WietrzykTV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yacobi01,
  author       = {Yacov Yacobi},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Few Thoughts on E-Commerce},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_1},
  doi          = {10.1007/3-540-47719-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yacobi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamamuraI01,
  author       = {Akihiro Yamamura and
                  Hirokazu Ishizuka},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Error Detection and Authentication in Quantum Key Distribution},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {260--273},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_22},
  doi          = {10.1007/3-540-47719-5\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamamuraI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamamuraS01,
  author       = {Akihiro Yamamura and
                  Taiichi Saito},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Private Information Retrieval Based on the Subgroup Membership Problem},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_18},
  doi          = {10.1007/3-540-47719-5\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamamuraS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangSR01,
  author       = {Jong{-}Phil Yang and
                  Weon Shin and
                  Kyung Hyune Rhee},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {An End-to-End Authentication Protocol in Wireless Application Protocol},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_21},
  doi          = {10.1007/3-540-47719-5\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangSR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yen01,
  author       = {Sung{-}Ming Yen},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Practical Key Recovery Schemes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_10},
  doi          = {10.1007/3-540-47719-5\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YesbergH01,
  author       = {John Yesberg and
                  Marie Henderson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Applications of Trusted Review to Information Security},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_25},
  doi          = {10.1007/3-540-47719-5\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YesbergH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoussefG01,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Cryptanalysis of a Public Key Cryptosystem Proposed at {ACISP} 2000},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {15--20},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_3},
  doi          = {10.1007/3-540-47719-5\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YoussefG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZennerKL01,
  author       = {Erik Zenner and
                  Matthias Krause and
                  Stefan Lucks},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Improved Cryptanalysis of the Self-Shrinking Generator},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_4},
  doi          = {10.1007/3-540-47719-5\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZennerKL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2001,
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5},
  doi          = {10.1007/3-540-47719-5},
  isbn         = {3-540-42300-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics