Search dblp for Publications

export results for "toc:db/conf/acisp/acisp1999.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/AshleyBV99,
  author       = {Paul Ashley and
                  Bradley Broom and
                  Mark Vandenwauver},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Implementation of a Secure Version of {NFS} Including {RBAC}},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_18},
  doi          = {10.1007/3-540-48970-3\_18},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AshleyBV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV99,
  author       = {Yun Bai and
                  Vijay Varadharajan},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Authorization in Object Oriented Databases},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {270--280},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_22},
  doi          = {10.1007/3-540-48970-3\_22},
  timestamp    = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydFP99,
  author       = {Colin Boyd and
                  Ernest Foo and
                  Chris Pavlovski},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient Electronic Cash Using Batch Signatures},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_20},
  doi          = {10.1007/3-540-48970-3\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydFP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FungG99,
  author       = {Wai W. Fung and
                  James W. Gray III},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On \emph{m}-Permutation Protection Scheme Against Modification Attack},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_7},
  doi          = {10.1007/3-540-48970-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FungG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiP99,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature
                  Schemes},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {129--134},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_11},
  doi          = {10.1007/3-540-48970-3\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GolicCD99,
  author       = {Jovan Dj. Golic and
                  Andrew J. Clark and
                  Ed Dawson},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Inversion Attack and Branching},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {88--102},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_8},
  doi          = {10.1007/3-540-48970-3\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GolicCD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GysinS99,
  author       = {Marc Gysin and
                  Jennifer Seberry},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Generalised Cycling Attacks on {RSA} and Strong {RSA} Primes},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_13},
  doi          = {10.1007/3-540-48970-3\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GysinS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HortonS99,
  author       = {Jeffrey Horton and
                  Jennifer Seberry},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Companion Viruses and the Macintosh: Threats and Countermeasures},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {202--212},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_17},
  doi          = {10.1007/3-540-48970-3\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HortonS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeHYC99,
  author       = {Seungwon Lee and
                  Seong{-}Min Hong and
                  Hyunsoo Yoon and
                  Yookun Cho},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Accelerating Key Establishment Protocols for Mobile Communication},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_5},
  doi          = {10.1007/3-540-48970-3\_5},
  timestamp    = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeHYC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lenstra99,
  author       = {Arjen K. Lenstra},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {294--302},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_24},
  doi          = {10.1007/3-540-48970-3\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lenstra99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiP99,
  author       = {Chih{-}Hung Li and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Conference Key Agreement from Secret Sharing},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {64--76},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_6},
  doi          = {10.1007/3-540-48970-3\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaitraS99,
  author       = {Subhamoy Maitra and
                  Palash Sarkar},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Enumeration of Correlation Immune Boolean Functions},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {12--25},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_2},
  doi          = {10.1007/3-540-48970-3\_2},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaitraS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MartinPSW99,
  author       = {Keith M. Martin and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Changing Thresholds in the Absence of Secure Channels},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_15},
  doi          = {10.1007/3-540-48970-3\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MartinPSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MillanCD99,
  author       = {William Millan and
                  Andrew J. Clark and
                  Ed Dawson},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Boolean Function Design Using Hill Climbing Methods},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_1},
  doi          = {10.1007/3-540-48970-3\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MillanCD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Muller99,
  author       = {Siguna M{\"{u}}ller},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Security of an {RSA} Based Encryption Scheme},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_12},
  doi          = {10.1007/3-540-48970-3\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Muller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenMV99,
  author       = {Khanh Quoc Nguyen and
                  Yi Mu and
                  Vijay Varadharajan},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Divertible Zero-Knowledge Proof of Polynominal Relations and Blind
                  Group Signature},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_10},
  doi          = {10.1007/3-540-48970-3\_10},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenMV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PeiLWS99,
  author       = {Dingyi Pei and
                  Yuqiang Li and
                  Yejing Wang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Characterization of Optimal Authentication Codes with Arbitration},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {303--313},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_25},
  doi          = {10.1007/3-540-48970-3\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PeiLWS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QuSP99,
  author       = {Chengxin Qu and
                  Jennifer Seberry and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Symmetric Property of Homogeneous Boolean Functions},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {26--35},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_3},
  doi          = {10.1007/3-540-48970-3\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/QuSP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaeedniaG99,
  author       = {Shahrokh Saeednia and
                  Hossein Ghodosi},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Self-Certified Group-Oriented Cryptosystem Without a Combiner},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {192--201},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_16},
  doi          = {10.1007/3-540-48970-3\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SaeedniaG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaundersHV99,
  author       = {Gregory Saunders and
                  Michael Hitchens and
                  Vijay Varadharajan},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Analysis of Access Control Models},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {281--293},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_23},
  doi          = {10.1007/3-540-48970-3\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SaundersHV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloSP99,
  author       = {Willy Susilo and
                  Reihaneh Safavi{-}Naini and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Fail-Stop Threshold Signature Schemes Based on Elliptic Curves},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {103--116},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_9},
  doi          = {10.1007/3-540-48970-3\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloSP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TiountchikT99,
  author       = {Alexander Tiountchik and
                  Elena Trichina},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {{RSA} Acceleration with Field Programmable Gate Arrays},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_14},
  doi          = {10.1007/3-540-48970-3\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TiountchikT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Traore99,
  author       = {Jacques Traor{\'{e}}},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Group Signatures and Their Relevance to Privacy-Protecting Off-Line
                  Electronic Cash Systems},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_19},
  doi          = {10.1007/3-540-48970-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Traore99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ViswanathanBD99,
  author       = {Kapali Viswanathan and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Publicly Verifiable Key Escrow with Limited Time Span},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_4},
  doi          = {10.1007/3-540-48970-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ViswanathanBD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yamamura99,
  author       = {Akihiro Yamamura},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Functional Cryptosystem Using a Group Action},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {314--325},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_26},
  doi          = {10.1007/3-540-48970-3\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yamamura99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhouDB99,
  author       = {Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Evolution of Fair Non-repudiation with {TTP}},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {258--269},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_21},
  doi          = {10.1007/3-540-48970-3\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhouDB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1999,
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3},
  doi          = {10.1007/3-540-48970-3},
  isbn         = {3-540-65756-8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics