default search action
4. ACISP 1999: Wollongong, NSW, Australia
- Josef Pieprzyk, Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings. Lecture Notes in Computer Science 1587, Springer 1999, ISBN 3-540-65756-8
Boolean Functions
- William Millan, Andrew J. Clark, Ed Dawson:
Boolean Function Design Using Hill Climbing Methods. 1-11 - Subhamoy Maitra, Palash Sarkar:
Enumeration of Correlation Immune Boolean Functions. 12-25 - Chengxin Qu, Jennifer Seberry, Josef Pieprzyk:
On the Symmetric Property of Homogeneous Boolean Functions. 26-35
Key Management
- Kapali Viswanathan, Colin Boyd, Ed Dawson:
Publicly Verifiable Key Escrow with Limited Time Span. 36-50 - Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho:
Accelerating Key Establishment Protocols for Mobile Communication. 51-63 - Chih-Hung Li, Josef Pieprzyk:
Conference Key Agreement from Secret Sharing. 64-76
Cryptanalysis
- Wai W. Fung, James W. Gray III:
On m-Permutation Protection Scheme Against Modification Attack. 77-87 - Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. 88-102
Signatures
- Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk:
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. 103-116 - Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. 117-128 - Hossein Ghodosi, Josef Pieprzyk:
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. 129-134
RSA Cryptosystems
- Siguna Müller:
On the Security of an RSA Based Encryption Scheme. 135-148 - Marc Gysin, Jennifer Seberry:
Generalised Cycling Attacks on RSA and Strong RSA Primes. 149-163 - Alexander Tiountchik, Elena Trichina:
RSA Acceleration with Field Programmable Gate Arrays. 164-176
Group Cryptography
- Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. 177-191 - Shahrokh Saeednia, Hossein Ghodosi:
A Self-Certified Group-Oriented Cryptosystem Without a Combiner. 192-201
Network Security
- Jeffrey Horton, Jennifer Seberry:
Companion Viruses and the Macintosh: Threats and Countermeasures. 202-212 - Paul Ashley, Bradley Broom, Mark Vandenwauver:
An Implementation of a Secure Version of NFS Including RBAC. 213-227
Electronic Commerce
- Jacques Traoré:
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. 228-243 - Colin Boyd, Ernest Foo, Chris Pavlovski:
Efficient Electronic Cash Using Batch Signatures. 244-257 - Jianying Zhou, Robert H. Deng, Feng Bao:
Evolution of Fair Non-repudiation with TTP. 258-269
Access Contol
- Yun Bai, Vijay Varadharajan:
Authorization in Object Oriented Databases. 270-280 - Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
An Analysis of Access Control Models. 281-293
Odds and Ends
- Arjen K. Lenstra:
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. 294-302 - Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini:
Characterization of Optimal Authentication Codes with Arbitration. 303-313 - Akihiro Yamamura:
A Functional Cryptosystem Using a Group Action. 314-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.