Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2001.bht:"
@inproceedings{DBLP:conf/acisp/AnsperBSW01, author = {Arne Ansper and Ahto Buldas and M{\"{a}}rt Saarepera and Jan Willemson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Improving the Availability of Time-Stamping Services}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {360--375}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_29}, doi = {10.1007/3-540-47719-5\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AnsperBSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaoDFGW01, author = {Feng Bao and Robert H. Deng and Peirong Feng and Yan Guo and Hongjun Wu}, editor = {Vijay Varadharajan and Yi Mu}, title = {Secure and Private Distribution of Online Video and Some Related Cryptographic Issues}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {190--205}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_17}, doi = {10.1007/3-540-47719-5\_17}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BaoDFGW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydMN01, author = {Colin Boyd and Paul Montague and Khanh Quoc Nguyen}, editor = {Vijay Varadharajan and Yi Mu}, title = {Elliptic Curve Based Password Authenticated Key Exchange Protocols}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {487--501}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_38}, doi = {10.1007/3-540-47719-5\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrincatM01, author = {Karl Brincat and Chris J. Mitchell}, editor = {Vijay Varadharajan and Yi Mu}, title = {New {CBC-MAC} Forgery Attacks}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {3--14}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_2}, doi = {10.1007/3-540-47719-5\_2}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrincatM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChiPJL01, author = {Sung{-}Do Chi and Jong Sou Park and Ki{-}Chan Jung and Jang{-}Se Lee}, editor = {Vijay Varadharajan and Yi Mu}, title = {Network Security Modeling and Cyber Attack Simulation Methodology}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {320--333}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_26}, doi = {10.1007/3-540-47719-5\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChiPJL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChoHOYHLPP01, author = {Eun{-}Sun Cho and Sunho Hong and Sechang Oh and Hongjin Yeh and Manpyo Hong and Cheol Won Lee and Hyundong Park and Chun{-}Sik Park}, editor = {Vijay Varadharajan and Yi Mu}, title = {{SKETHIC:} Secure Kernel Extension against Trojan Horses with Information-Carrying Codes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {177--189}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_16}, doi = {10.1007/3-540-47719-5\_16}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChoHOYHLPP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiP01, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Vijay Varadharajan and Yi Mu}, title = {Democratic Systems}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {392--402}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_31}, doi = {10.1007/3-540-47719-5\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GotoMSW01, author = {Hideaki Goto and Masahiro Mambo and Hiroki Shizuya and Yasuyoshi Watanabe}, editor = {Vijay Varadharajan and Yi Mu}, title = {Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {145--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_13}, doi = {10.1007/3-540-47719-5\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GotoMSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiroseY01, author = {Shoichi Hirose and Susumu Yoshida}, editor = {Vijay Varadharajan and Yi Mu}, title = {A User Authentication Scheme with Identity and Location Privacy}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {235--246}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_20}, doi = {10.1007/3-540-47719-5\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiroseY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ItoiAPR01, author = {Naomaru Itoi and William A. Arbaugh and Samuela J. Pollack and Daniel M. Reeves}, editor = {Vijay Varadharajan and Yi Mu}, title = {Personal Secure Booting}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {130--144}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_12}, doi = {10.1007/3-540-47719-5\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ItoiAPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JungKRW01, author = {Oliver Jung and Sven Kuhn and Christoph Ruland and Kai Wollenweber}, editor = {Vijay Varadharajan and Yi Mu}, title = {Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {344--359}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_28}, doi = {10.1007/3-540-47719-5\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JungKRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KangYHC01, author = {Ju{-}Sung Kang and Okyeon Yi and Dowon Hong and Hyun Sook Cho}, editor = {Vijay Varadharajan and Yi Mu}, title = {Pseudorandomness of MISTY-Type Transformations and the Block Cipher {KASUMI}}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {60--73}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_7}, doi = {10.1007/3-540-47719-5\_7}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KangYHC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimM01, author = {Hwankoo Kim and Sang{-}Jae Moon}, editor = {Vijay Varadharajan and Yi Mu}, title = {New Public-Key Cryptosystem Using Divisor Class Groups}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {74--83}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_8}, doi = {10.1007/3-540-47719-5\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/King01, author = {Brian King}, editor = {Vijay Varadharajan and Yi Mu}, title = {Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {376--391}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_30}, doi = {10.1007/3-540-47719-5\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/King01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeKK01, author = {Byoungcheon Lee and Heesun Kim and Kwangjo Kim}, editor = {Vijay Varadharajan and Yi Mu}, title = {Secure Mobile Agent Using Strong Non-designated Proxy Signature}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {474}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_37}, doi = {10.1007/3-540-47719-5\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeKK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lin01, author = {Along Lin}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Knowledge-Based Approach to Internet Authorizations}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {292--304}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_24}, doi = {10.1007/3-540-47719-5\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuOC01, author = {Chuchang Liu and Maris A. Ozols and Anthony Cant}, editor = {Vijay Varadharajan and Yi Mu}, title = {An Axiomatic Basis for Reasoning about Trust in PKIs}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {274--291}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_23}, doi = {10.1007/3-540-47719-5\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuOC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaedaMT01, author = {Ayako Maeda and Atsuko Miyaji and Mitsuru Tada}, editor = {Vijay Varadharajan and Yi Mu}, title = {Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {403--416}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_32}, doi = {10.1007/3-540-47719-5\_32}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaedaMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MayMS01, author = {David May and Henk L. Muller and Nigel P. Smart}, editor = {Vijay Varadharajan and Yi Mu}, title = {Non-deterministic Processors}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {115--129}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_11}, doi = {10.1007/3-540-47719-5\_11}, timestamp = {Mon, 20 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MayMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MeyerNP01, author = {Andreas Meyer and Stefan Neis and Thomas Pfahler}, editor = {Vijay Varadharajan and Yi Mu}, title = {First Implementation of Cryptographic Protocols Based on Algebraic Number Fields}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {84--103}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_9}, doi = {10.1007/3-540-47719-5\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MeyerNP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakanishiS01, author = {Toru Nakanishi and Yuji Sugiyama}, editor = {Vijay Varadharajan and Yi Mu}, title = {Anonymous Statistical Survey of Attributes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {460--473}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_36}, doi = {10.1007/3-540-47719-5\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakanishiS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Neumann01, author = {B. Clifford Neuman}, editor = {Vijay Varadharajan and Yi Mu}, title = {Condition-Driven Integration of Security Services}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {176}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_15}, doi = {10.1007/3-540-47719-5\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Neumann01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OmoteM01, author = {Kazumasa Omote and Atsuko Miyaji}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Practical English Auction with One-Time Registration}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {221--234}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_19}, doi = {10.1007/3-540-47719-5\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OmoteM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ParkKBD01, author = {DongGook Park and JungJoon Kim and Colin Boyd and Ed Dawson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Cryptographic Salt: {A} Countermeasure against Denial-of-Service Attacks}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {334--343}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_27}, doi = {10.1007/3-540-47719-5\_27}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ParkKBD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PavlovskiB01, author = {Chris Pavlovski and Colin Boyd}, editor = {Vijay Varadharajan and Yi Mu}, title = {Attacks Based on Small Factors in Various Group Structures}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {36--50}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_5}, doi = {10.1007/3-540-47719-5\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PavlovskiB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaeedniaSS01, author = {Shahrokh Saeednia and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Vijay Varadharajan and Yi Mu}, title = {On Classifying Conference Key Distribution Protocols}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {51--59}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_6}, doi = {10.1007/3-540-47719-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SaeedniaSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Safavi-NainiSW01, author = {Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Vijay Varadharajan and Yi Mu}, title = {How to Construct Fail-Stop Confirmer Signature Schemes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {435--444}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_34}, doi = {10.1007/3-540-47719-5\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Safavi-NainiSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Shim01, author = {Kyungah Shim}, editor = {Vijay Varadharajan and Yi Mu}, title = {Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {514--520}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_40}, doi = {10.1007/3-540-47719-5\_40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Shim01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/StinsonS01, author = {Douglas R. Stinson and Reto Strobl}, editor = {Vijay Varadharajan and Yi Mu}, title = {Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {417--434}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_33}, doi = {10.1007/3-540-47719-5\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/StinsonS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TanYS01, author = {Chik How Tan and Xun Yi and Chee Kheong Siew}, editor = {Vijay Varadharajan and Yi Mu}, title = {Signature Schemes Based on 3rd Order Shift Registers}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {445--459}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_35}, doi = {10.1007/3-540-47719-5\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TanYS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01, author = {Andr{\'{e}} Weimerskirch and Christof Paar and Sheueling Chang Shantz}, editor = {Vijay Varadharajan and Yi Mu}, title = {Elliptic Curve Cryptography on a Palm {OS} Device}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {502--513}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_39}, doi = {10.1007/3-540-47719-5\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WietrzykTV01, author = {Vlad Ingar Wietrzyk and Makoto Takizawa and Vijay Varadharajan}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Strategy for {MLS} Workflow}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {159--175}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_14}, doi = {10.1007/3-540-47719-5\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WietrzykTV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yacobi01, author = {Yacov Yacobi}, editor = {Vijay Varadharajan and Yi Mu}, title = {A Few Thoughts on E-Commerce}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {1--2}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_1}, doi = {10.1007/3-540-47719-5\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yacobi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamuraI01, author = {Akihiro Yamamura and Hirokazu Ishizuka}, editor = {Vijay Varadharajan and Yi Mu}, title = {Error Detection and Authentication in Quantum Key Distribution}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {260--273}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_22}, doi = {10.1007/3-540-47719-5\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamuraI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamuraS01, author = {Akihiro Yamamura and Taiichi Saito}, editor = {Vijay Varadharajan and Yi Mu}, title = {Private Information Retrieval Based on the Subgroup Membership Problem}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {206--220}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_18}, doi = {10.1007/3-540-47719-5\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamuraS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YangSR01, author = {Jong{-}Phil Yang and Weon Shin and Kyung Hyune Rhee}, editor = {Vijay Varadharajan and Yi Mu}, title = {An End-to-End Authentication Protocol in Wireless Application Protocol}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {247--259}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_21}, doi = {10.1007/3-540-47719-5\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YangSR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yen01, author = {Sung{-}Ming Yen}, editor = {Vijay Varadharajan and Yi Mu}, title = {Practical Key Recovery Schemes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {104--114}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_10}, doi = {10.1007/3-540-47719-5\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YesbergH01, author = {John Yesberg and Marie Henderson}, editor = {Vijay Varadharajan and Yi Mu}, title = {Applications of Trusted Review to Information Security}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {305--319}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_25}, doi = {10.1007/3-540-47719-5\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YesbergH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoussefG01, author = {Amr M. Youssef and Guang Gong}, editor = {Vijay Varadharajan and Yi Mu}, title = {Cryptanalysis of a Public Key Cryptosystem Proposed at {ACISP} 2000}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {15--20}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_3}, doi = {10.1007/3-540-47719-5\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YoussefG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZennerKL01, author = {Erik Zenner and Matthias Krause and Stefan Lucks}, editor = {Vijay Varadharajan and Yi Mu}, title = {Improved Cryptanalysis of the Self-Shrinking Generator}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {21--35}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_4}, doi = {10.1007/3-540-47719-5\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZennerKL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2001, editor = {Vijay Varadharajan and Yi Mu}, title = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5}, doi = {10.1007/3-540-47719-5}, isbn = {3-540-42300-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.