|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 391 occurrences of 265 keywords
|
|
|
Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Vijay Varadharajan, Phillip Allen |
Support for joint action based security policies. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Babak Sadeghiyan, Javad Mohajeri |
A new universal test for bit strings. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Tailoring authentication protocols to match underlying mechanisms. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk |
On password-based authenticated key exchange using collisionful hash functions. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic |
Edit distance correlation attacks on clock-controlled combiners with memory. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic |
On period of multiplexed sequences. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu |
Access Control: The Neglected Frontier. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Chuan-Kun Wu, Ed Dawson |
On construction of resilient functions. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini |
Cryptosystems for hierarchical groups. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Steve Orlowski |
The Changing Face of Information Technology Security. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Eugene F. Troy |
Breakthroughs in Standardization of IT Security Criteria. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Yuliang Zheng 0001 |
An alternative model of quantum key agreement via photon coupling. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ed Dawson, He Jingmin |
Another approach to software key escrow encryption. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Yongfei Han |
Investigation of non-repudiation protocols. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Jennifer Seberry (eds.) |
Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan |
On the design of security protocols for mobile communications. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Erland Jonsson, Mikael Andersson |
On the quantitative assessment of behavioural security. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk |
Evidential reasoning in network intrusion detection systems. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Miodrag J. Mihaljevic |
A faster cryptanalysis of the self-shrinking generator. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini |
Modeling a multi-level secure object-oriented database using views. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | R. Taylor |
Non-repudiation without public-key. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd |
A Framework for Design of Key Establishment Protocols. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hardjono, Jennifer Seberry |
Replicating the Kuperee authentication server for increased security and reliability. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Gustafson, Erland Jonsson, Tomas Olovsson |
On the modelling of preventive security based on a PC network intrusion experiment. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Shin-Jia Hwang, Chin-Chen Chang 0001 |
A dynamic secret sharing scheme with cheater detection. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk |
On selectable collisionful hash functions. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ari Renvall, Cunsheng Ding |
A nonlinear secret sharing scheme. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini |
Cryptography based on transcendental numbers. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ari Renvall, Cunsheng Ding |
The access structure of some secret-sharing schemes. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang 0001 |
A group-oriented (t, n) undeniable signature scheme without trusted center. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #901 - #930 of 930 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10] |
|