Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp1999.bht:"
@inproceedings{DBLP:conf/acisp/AshleyBV99, author = {Paul Ashley and Bradley Broom and Mark Vandenwauver}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Implementation of a Secure Version of {NFS} Including {RBAC}}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {213--227}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_18}, doi = {10.1007/3-540-48970-3\_18}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AshleyBV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiV99, author = {Yun Bai and Vijay Varadharajan}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Authorization in Object Oriented Databases}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {270--280}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_22}, doi = {10.1007/3-540-48970-3\_22}, timestamp = {Thu, 29 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydFP99, author = {Colin Boyd and Ernest Foo and Chris Pavlovski}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient Electronic Cash Using Batch Signatures}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {244--257}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_20}, doi = {10.1007/3-540-48970-3\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydFP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FungG99, author = {Wai W. Fung and James W. Gray III}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On \emph{m}-Permutation Protection Scheme Against Modification Attack}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {77--87}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_7}, doi = {10.1007/3-540-48970-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/FungG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiP99, author = {Hossein Ghodosi and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {129--134}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_11}, doi = {10.1007/3-540-48970-3\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GolicCD99, author = {Jovan Dj. Golic and Andrew J. Clark and Ed Dawson}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Inversion Attack and Branching}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {88--102}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_8}, doi = {10.1007/3-540-48970-3\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GolicCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GysinS99, author = {Marc Gysin and Jennifer Seberry}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Generalised Cycling Attacks on {RSA} and Strong {RSA} Primes}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {149--163}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_13}, doi = {10.1007/3-540-48970-3\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GysinS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HortonS99, author = {Jeffrey Horton and Jennifer Seberry}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Companion Viruses and the Macintosh: Threats and Countermeasures}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {202--212}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_17}, doi = {10.1007/3-540-48970-3\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HortonS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeHYC99, author = {Seungwon Lee and Seong{-}Min Hong and Hyunsoo Yoon and Yookun Cho}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Accelerating Key Establishment Protocols for Mobile Communication}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {51--63}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_5}, doi = {10.1007/3-540-48970-3\_5}, timestamp = {Thu, 06 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeHYC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Lenstra99, author = {Arjen K. Lenstra}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {294--302}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_24}, doi = {10.1007/3-540-48970-3\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Lenstra99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiP99, author = {Chih{-}Hung Li and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Conference Key Agreement from Secret Sharing}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {64--76}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_6}, doi = {10.1007/3-540-48970-3\_6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaitraS99, author = {Subhamoy Maitra and Palash Sarkar}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Enumeration of Correlation Immune Boolean Functions}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {12--25}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_2}, doi = {10.1007/3-540-48970-3\_2}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MaitraS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MartinPSW99, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Changing Thresholds in the Absence of Secure Channels}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {177--191}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_15}, doi = {10.1007/3-540-48970-3\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MartinPSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MillanCD99, author = {William Millan and Andrew J. Clark and Ed Dawson}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Boolean Function Design Using Hill Climbing Methods}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {1--11}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_1}, doi = {10.1007/3-540-48970-3\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MillanCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Muller99, author = {Siguna M{\"{u}}ller}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Security of an {RSA} Based Encryption Scheme}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {135--148}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_12}, doi = {10.1007/3-540-48970-3\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Muller99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenMV99, author = {Khanh Quoc Nguyen and Yi Mu and Vijay Varadharajan}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {117--128}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_10}, doi = {10.1007/3-540-48970-3\_10}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenMV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PeiLWS99, author = {Dingyi Pei and Yuqiang Li and Yejing Wang and Reihaneh Safavi{-}Naini}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Characterization of Optimal Authentication Codes with Arbitration}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {303--313}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_25}, doi = {10.1007/3-540-48970-3\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PeiLWS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QuSP99, author = {Chengxin Qu and Jennifer Seberry and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Symmetric Property of Homogeneous Boolean Functions}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {26--35}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_3}, doi = {10.1007/3-540-48970-3\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/QuSP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaeedniaG99, author = {Shahrokh Saeednia and Hossein Ghodosi}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Self-Certified Group-Oriented Cryptosystem Without a Combiner}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {192--201}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_16}, doi = {10.1007/3-540-48970-3\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SaeedniaG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SaundersHV99, author = {Gregory Saunders and Michael Hitchens and Vijay Varadharajan}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Analysis of Access Control Models}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {281--293}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_23}, doi = {10.1007/3-540-48970-3\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SaundersHV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloSP99, author = {Willy Susilo and Reihaneh Safavi{-}Naini and Josef Pieprzyk}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Fail-Stop Threshold Signature Schemes Based on Elliptic Curves}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {103--116}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_9}, doi = {10.1007/3-540-48970-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SusiloSP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TiountchikT99, author = {Alexander Tiountchik and Elena Trichina}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {{RSA} Acceleration with Field Programmable Gate Arrays}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {164--176}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_14}, doi = {10.1007/3-540-48970-3\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TiountchikT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Traore99, author = {Jacques Traor{\'{e}}}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {228--243}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_19}, doi = {10.1007/3-540-48970-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Traore99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ViswanathanBD99, author = {Kapali Viswanathan and Colin Boyd and Ed Dawson}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Publicly Verifiable Key Escrow with Limited Time Span}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {36--50}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_4}, doi = {10.1007/3-540-48970-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ViswanathanBD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yamamura99, author = {Akihiro Yamamura}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Functional Cryptosystem Using a Group Action}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {314--325}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_26}, doi = {10.1007/3-540-48970-3\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yamamura99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhouDB99, author = {Jianying Zhou and Robert H. Deng and Feng Bao}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Evolution of Fair Non-repudiation with {TTP}}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {258--269}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_21}, doi = {10.1007/3-540-48970-3\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhouDB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/1999, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3}, doi = {10.1007/3-540-48970-3}, isbn = {3-540-65756-8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.