Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Adrian Spalka, Armin B. Cremers, Hartmut Lehmler |
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | William D. Banks, Daniel Lieman, Igor E. Shparlinski |
An Extremely Small and Efficient Identification Scheme. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Richard Au, Mark Looi, Paul Ashley |
Towards a New Authorisation Paradigm for Extranets. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Niels Ferguson, Bruce Schneier, David A. Wagner 0001 |
Security Weaknesses in a Randomized Stream Cipher. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan |
An Analysis of Access Control Models. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Shahrokh Saeednia, Hossein Ghodosi |
A Self-Certified Group-Oriented Cryptosystem Without a Combiner. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chengxin Qu, Jennifer Seberry, Josef Pieprzyk |
On the Symmetric Property of Homogeneous Boolean Functions. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
S-box Theory, Cryptographically Strong Boolean Functions, Homogeneous Functions, Symmetric Functions |
1 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
1 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk |
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic, Andrew J. Clark, Ed Dawson |
Inversion Attack and Branching. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ashley, Bradley Broom, Mark Vandenwauver |
An Implementation of a Secure Version of NFS Including RBAC. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yun Bai 0001, Vijay Varadharajan |
Authorization in Object Oriented Databases. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
security, formal specification, object oriented databases, inheritance, authorization policy |
1 | Seungwon Lee, Seong-Min Hong 0001, Hyunsoo Yoon, Yookun Cho |
Accelerating Key Establishment Protocols for Mobile Communication. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Subhamoy Maitra, Palash Sarkar 0001 |
Enumeration of Correlation Immune Boolean Functions. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Boolean Function, Stream Cipher, Symmetry, Nonlinearity, Enumeration, Balancedness, Correlation Immunity, Nondegeneracy |
1 | Siguna Müller |
On the Security of an RSA Based Encryption Scheme. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Traoré |
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | William Millan, Andrew J. Clark, Ed Dawson |
Boolean Function Design Using Hill Climbing Methods. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Wai W. Fung, James W. Gray III |
On m-Permutation Protection Scheme Against Modification Attack. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Publicly Verifiable Key Escrow with Limited Time Span. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 |
Evolution of Fair Non-repudiation with TTP. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
fair non-repudiation, trusted third party, secure electronic commerce |
1 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang |
Changing Thresholds in the Absence of Secure Channels. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing |
1 | Jeffrey Horton, Jennifer Seberry |
Companion Viruses and the Macintosh: Threats and Countermeasures. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Tiountchik, Elena Trichina |
RSA Acceleration with Field Programmable Gate Arrays. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra |
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Akihiro Yamamura |
A Functional Cryptosystem Using a Group Action. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
functional cryptosystem, backward deterministic system, modular group, amalgamated free product, public-key cryptosystem |
1 | Marc Gysin, Jennifer Seberry |
Generalised Cycling Attacks on RSA and Strong RSA Primes. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini |
Characterization of Optimal Authentication Codes with Arbitration. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry (eds.) |
Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Li, Josef Pieprzyk |
Conference Key Agreement from Secret Sharing. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols |
1 | Colin Boyd, Ernest Foo, Chris Pavlovski |
Efficient Electronic Cash Using Batch Signatures. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Rudolph |
A Formal Model for Systematic Design of Key Establishment Protocols. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Falk, Markus Trommer |
Integrated Management of Network and Host Based Security Mechanisms. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Qi He, Katia P. Sycara, Zhongmin Su |
A Solution to Open Standard of PKI. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Xun Yi, Kwok-Yan Lam, Yongfei Han |
Differential Cryptanalysis of a Block Cipher. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Uri Blumenthal, Nguyen C. Hien, J. H. Rooney |
Low-Cost Secure Server Connection with Limited-Privilege Clients. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Shiuh-Pyng Shieh |
On Private-Key Cryptosystems Based on Product Codes. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jaroslav Hruby |
Trends in Quantum Cryptography in Czech Republic. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Ed Dawson (eds.) |
Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura |
Fast Access Control Decisions from Delegation Certificate Databases. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Yuliang Zheng 0001, Hideki Imai |
LITESET: A Light-Weight Secure Electronic Transaction Protocol. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Wai W. Fung, James W. Gray III |
Protection Against EEPROM Modification Attacks. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Leonie Simpson, Jovan Dj. Golic, Ed Dawson |
A Probabilistic Correlation Attack on the Shrinking Generator. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Cryptography, Stream ciphers, Correlation attacks, Shrinking generator |
1 | Per Kaijser |
A Review of the SESAME Development. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini |
Secret Sharing in Multilevel and Compartmented Groups. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security |
1 | Tage Stabell-Kulø, Arne Helme, Gianluca Dini |
Detecting Key-Dependencies. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Martin Manninger, Robert Schischka |
Adapting an Electronic Purse for Internet Payments. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Shahrokh Saeednia, Reihaneh Safavi-Naini |
Efficient Identity-Based Conference Key Distribution Protocols. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Security classes, Identity-based, Conference key |
1 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang |
On Construction of Cumulative Secret Sharing Schemes. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Gregory G. Rose |
A Stream Cipher Based on Linear Feedback over GF(28). |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
1 | Thomas Riechmann, Jürgen Kleinöder |
Meta Objects for Access Control: Role-Based Principals. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic, Renato Menicocci |
Correlation Attacks on Up/Down Cascades. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
clock-controlled shift registers, up/down and stop/go cascades, cryptanalysis, Stream ciphers, correlation attacks |
1 | Yun Bai 0001, Vijay Varadharajan |
A High Level Language for Conventional Access Control Models. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Policy Transformations, Formal Language, Access Control Model, Authorization Policies |
1 | Jonathon Tidswell, John Potter |
A Dynamically Typed Access Control Model. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang |
On Zhang's Nonrepudiable Proxy Signature Schemes. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Elke Franz 0001, A. Graubner, Anja Jerichow, Andreas Pfitzmann |
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Anish Mathuria |
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ashley, Mark Vandenwauver, Bradley Broom |
A Uniform Approach to Securing Unix Applications Using SESAME. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Rauli Kaksonen, Petri Mähönen |
Object Modeling of Cryptographic Algorithms with UML. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Horton, Jennifer Seberry |
Covert Distributed Computing Using Java Through Web Spoofing. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa |
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Mark Chen, Eric Hughes |
Protocol Failures Related to Order of Encryption and Signature. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Cheng Xin Qu |
Rotation-Symmetric Functions and Fast Hashing. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo |
A User Identification System Using Signature Written with Mouse. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Yejing Wang |
Bounds and Constructions for A3-code with Multi-senders. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Marie Henderson |
Applications of Linearised and Sub-linearised Polynomials to Information Security. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | William Millan |
How to Improve the Nonlinearity of Bijective S-Boxes. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Gary Carter, Ed Dawson, Lauren Nielsen |
Key Schedules of Iterative Block Ciphers. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk |
A Message Authentication Code Based on Latin Squares. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jonathon Tidswell, John Potter |
An Approach to Dynamic Domain and Type Enforcement. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jussipekka Leiwo, Yuliang Zheng 0001 |
A Method to Implement a Denial of Service Protection Base. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang |
Prospectives for Modelling Trust in Information Security. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Shahrokh Saeednia |
Identity-Based and Self-Certified Key-Exchange Protocols. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin |
Practical Memory Checkers for Stacks, Queues and Deques. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Robert H. Deng, Yongfei Han, Albert B. Jeng |
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan, Yan-Xia Lin |
New Micropayment Schemes Based on PayWords. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jana Dittmann, Arnd Steinmetz |
Enabling Technology for the Trading of MPEG-encoded Video. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | M. Salmasidazeh, Leonie Simpson, Jovan Dj. Golic, Ed Dawson |
Fast Correlation Attacks and Multiple Linear Approximations. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | William Millan, Ed Dawson |
On the Security of Self-Synchronous Ciphers. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Satoshi Obana |
Characterisation of (k, n) Multi-receiver Authentication. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Masato Terada, Yuko Murayama |
User Access Domain Management Systems - ADAMS. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jen Lim, Colin Boyd, Ed Dawson |
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Aviel D. Rubin, Dan Boneh, Kevin Fu |
Revocation of Unread E-mail in an Untrusted Network. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra |
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai |
Protection of Data and Delegated Keys in Digital Distribution. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd |
On Key Agreement and Conference Key Agreement. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yun Bai 0001, Vijay Varadharajan |
Analysis and Implementation of a Formal Authorisation Policy Design Approach. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Xun Yi, Kwok-Yan Lam |
A New Hash Function Based on Block Cipher. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Josef Pieprzyk, Yi Mu 0001 (eds.) |
Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Takehito Abe, Hiroshi Fujii, Kazuhiko Kushima |
Image Distribution Method with Embedded Identifier Scheme for Copyright Protection. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Chor Wah Man, Reihaneh Safavi-Naini |
Democratic Key Escrow Scheme. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Wenbo Mao |
Verifiable Escrowed Signature. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security Issues in Asynchronous Transfer Mode. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | John Holford, George M. Mohay |
ProtectOS: Operating System and Hardware Support for Small Objects. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Albert Sadowski |
Inefficiency of Variant Characteristics for Substitution-Permutation Networks with Position Permutations. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Fred Piper |
Trusted Third Parties for Secure Electronic Commerce - Are They Needed? |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Xian-Mo Zhang, Yuliang Zheng 0001 |
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild |
Secret Sharing with Reusable Polynomials. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Takayuki Tachikawa, Hiroaki Higaki, Makoto Takizawa 0001 |
Purpose-Oriented Access Control Model in Object-Based Systems. |
ACISP |
1997 |
DBLP DOI BibTeX RDF |
|