Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Chun Ruan, Vijay Varadharajan |
Resolving Conflicts in Authorization Delegations. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee 0001, William Millan, Sang-Jae Moon, Leonie Simpson |
The LILI-II Keystream Generator. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Francesc Sebé, Josep Domingo-Ferrer |
Short 3-Secure Fingerprinting Codes for Copyright Protection. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Electronic copyright protection, Buyer collusion, Watermarking, Fingerprinting |
1 | Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild |
Size of Broadcast in Threshold Schemes with Disenrollment. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 |
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Sakurai, Tsuyoshi Takagi |
On the Security of a Modified Paillier Public-Key Primitive. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack |
1 | David Soldera, Jennifer Seberry, Chengxin Qu |
The Analysis of Zheng-Seberry Scheme. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto |
Modelling Trust Structures for Public Key Infrastructures. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Myungsun Kim, Kwangjo Kim |
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Gap-problems, Bilinear Diffie-Hellman problem, Identification scheme, Weil-pairing |
1 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Improvement of the Global Key Recovery System. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu |
Cryptanalysis of Stream Cipher Alpha1. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya, Kouichi Sakurai |
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack |
1 | Paul England, Marcus Peinado |
Authenticated Operation of Open Computing Devices. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim 0001 |
On the Security of Reduced Versions of 3-Pass HAVAL. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yvonne Hitchcock, Paul Montague |
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Lynn Margaret Batten, Jennifer Seberry (eds.) |
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan |
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Leonid Reyzin, Natan Reyzin |
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Linear Secret Sharing. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection |
1 | Mitsuru Tada |
An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Secure Re-keying Scheme with Key Recovery Property. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Bimal K. Roy |
A Brief Outline of Research on Correlation Immune Functions. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Boolean Function, Stream Cipher, Symmetry, Nonlinearity, Enumeration, Autocorrelation, Balancedness, Correlation Immunity, Algebraic Degree, Multiple Output Function |
1 | Wieland Fischer, Jean-Pierre Seifert |
Note on Fast Computation of Secret RSA Exponents. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation |
1 | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson |
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Shoichi Hirose, Susumu Yoshida |
A User Authentication Scheme with Identity and Location Privacy. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Along Lin |
A Knowledge-Based Approach to Internet Authorizations. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Akihiro Yamamura, Hirokazu Ishizuka |
Error Detection and Authentication in Quantum Key Distribution. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi |
A Few Thoughts on E-Commerce. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves |
Personal Secure Booting. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyun Sook Cho |
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
(Super-)Pseudorandom permutation ensemble, MISTY-type transformation, KASUMI, Distinguisher |
1 | Vlad Ingar Wietrzyk, Makoto Takizawa 0001, Vijay Varadharajan |
A Strategy for MLS Workflow. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Erik Zenner, Matthias Krause 0001, Stefan Lucks |
Improved Cryptanalysis of the Self-Shrinking Generator. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Chuchang Liu, Maris A. Ozols, Anthony Cant |
An Axiomatic Basis for Reasoning about Trust in PKIs. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
CA (Certificate Authority), PKI (Public Key Infrastructure), trust theory, certificate verification, trust, information security, certificate |
1 | André Weimerskirch, Christof Paar, Sheueling Chang Shantz |
Elliptic Curve Cryptography on a Palm OS Device. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Douglas R. Stinson, Reto Strobl |
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | B. Clifford Neuman |
Condition-Driven Integration of Security Services. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe |
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Kazumasa Omote, Atsuko Miyaji |
A Practical English Auction with One-Time Registration. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Yi Mu 0001 (eds.) |
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu 0001 |
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Chik How Tan, Xun Yi, Chee Kheong Siew |
Signature Schemes Based on 3rd Order Shift Registers. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber |
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
1 | Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo |
On Classifying Conference Key Distribution Protocols. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park |
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Yuji Sugiyama |
Anonymous Statistical Survey of Attributes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Statistical survey of attributes, Anonymity, Shuffle, Group signature scheme, Threshold cryptosystem |
1 | Chris Pavlovski, Colin Boyd |
Attacks Based on Small Factors in Various Group Structures. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Meyer 0003, Stefan Neis, Thomas Pfahler |
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Amr M. Youssef, Guang Gong |
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | John Yesberg, Marie Henderson |
Applications of Trusted Review to Information Security. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Paul Montague, Khanh Quoc Nguyen |
Elliptic Curve Based Password Authenticated Key Exchange Protocols. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Kyungah Shim |
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Anomalous curve, supersingular curve, elliptic curve discrete logarithm, Weil pairing |
1 | Akihiro Yamamura, Taiichi Saito |
Private Information Retrieval Based on the Subgroup Membership Problem. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David May 0001, Henk L. Muller, Nigel P. Smart |
Non-deterministic Processors. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Hwankoo Kim, Sang-Jae Moon |
New Public-Key Cryptosystem Using Divisor Class Groups. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee |
An End-to-End Authentication Protocol in Wireless Application Protocol. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Brian King |
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Linear secret sharing, Randomness requirements, Threshold secret sharing |
1 | Hossein Ghodosi, Josef Pieprzyk |
Democratic Systems. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee |
Network Security Modeling and Cyber Attack Simulation Methodology. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Ayako Maeda, Atsuko Miyaji, Mitsuru Tada |
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang |
How to Construct Fail-Stop Confirmer Signature Schemes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson |
Improving the Availability of Time-Stamping Services. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Karl Brincat, Chris J. Mitchell |
New CBC-MAC Forgery Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Sung-Ming Yen |
Practical Key Recovery Schemes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan |
Fail-Stop Confirmer Signatures. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Heajoung Yoo, Seokhie Hong, Sangjin Lee 0002, Jong In Lim 0001, Okyeon Yi, Maenghee Sung |
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Brian King |
Algorithms to Speed Up Computations in Threshold RSA. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
High Performance Agile Crypto Modules. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Yasuyuki Sakai, Kouichi Sakurai |
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto |
Light Weight Broadcast Exclusion Using Secret Sharing. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant |
The PKI Specification Dilemma: A Formal Solution. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Alan Underwood |
Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Masayuki Kanda |
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | John A. Clark, Jeremy Jacob |
Two-Stage Optimisation in the Design of Boolean Functions. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Kook-Heui Lee, Sang-Jae Moon |
AKA Protocols for Mobile Communications. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Lauren May, Lyta Penna, Andrew J. Clark |
An Implementation of Bitsliced DES on the Pentium MMXTM Processor. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Feng Bao 0001, Dingfeng Ye, Robert H. Deng |
Cryptanalysis of Polynominal Authentication and Signature Scheme. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson |
Key Recovery System for the Commercial Environment. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic |
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel |
Sharing Block Ciphers. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Sakurai, Shingo Miyazaki |
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Zhu Hui, Daniel T. H. Tan |
A Novel Engine for Various Intrusion Detection Methods. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Sklavos, Angelos P. Varvitsiotis, Despina Polemi |
Securing Large E-Commerce Networks. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ed Dawson, Andrew J. Clark, Colin Boyd (eds.) |
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Khanh Quoc Nguyen, Jacques Traoré |
An Online Public Auction Protocol Protecting Bidder Privacy. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao |
On Multiplicative Secret Sharing Schemes. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Shirow Mitomi, Atsuko Miyaji |
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
A Three Phased Schema for Sealed Bid Auction System Design. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Ghodosi, Josef Pieprzyk |
Cheating Prevention in Secret Sharing. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang, Ingar Glenn Pedersen, Dean Povey |
PKI Seeks a Trusting Relationship. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Bob Blakley 0001, G. R. Blakley |
All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos |
Secure Transactions with Mobile Agents in Hostile Environments. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Feng Bao 0001, Dingfeng Ye, Robert H. Deng |
Cryptanalysis of the m-Permutation Protection Schemes. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang |
Key Management for Secure Multicast with Dynamic Controller. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | G. R. Blakley, I. Borosh, Andreas Klappenecker |
Construction and Categories of Codes. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Doi, Masahiro Mambo, Eiji Okamoto |
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Lawrie Brown |
Custom Safety Policies in Safe Erlang. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ernest Foo, Colin Boyd |
Passive Entities: A Strategy for Electronic Payment Design. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Agung Budi Prasetijo, Paul Ashley, Mark Looi, Andrew J. Clark, Gary Gaskell |
A Three-Party HTTP Proxy to Support Internet Content Regulation. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Joonsang Baek, Byoungcheon Lee, Kwangjo Kim |
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|