The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2003 (conf/acisp/2003)

  1. Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng
    Grouping Verifiable Content for Selective Disclosure. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:1-12 [Conf]
  2. Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
    Evaluation of Anonymity of Practical Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:13-26 [Conf]
  3. Pino Persiano, Ivan Visconti
    An Anonymous Credential System and a Privacy-Aware PKI. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:27-38 [Conf]
  4. Masayuki Abe, Hideki Imai
    Flaws in Some Robust Optimistic Mix-Nets. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:39-50 [Conf]
  5. Andrew M. Odlyzko
    The Unsolvable Privacy Problem and Its Implications for Security Technologies. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:51-54 [Conf]
  6. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
    The Security of Fixed versus Random Elliptic Curves in Cryptography. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:55-66 [Conf]
  7. Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu
    Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:67-78 [Conf]
  8. André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz
    Generic GF(2) Arithmetic in Software and Its Application to ECC. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:79-92 [Conf]
  9. Seigo Arita
    An Addition Algorithm in Jacobian of C34 Curve. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:93-105 [Conf]
  10. Sung-Ming Yen
    Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:106-117 [Conf]
  11. Chien-Ning Chen, Sung-Ming Yen
    Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:118-129 [Conf]
  12. Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
    On the Pseudorandomness of KASUMI Type Permutations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:130-141 [Conf]
  13. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
    Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:142-153 [Conf]
  14. Libin Wang, Kefei Chen
    A Typed Theory for Access Control and Information Flow Control in Mobile Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:154-165 [Conf]
  15. Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
    Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:166-179 [Conf]
  16. Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn
    Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:180-191 [Conf]
  17. Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim
    Practical Pay TV Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:192-203 [Conf]
  18. Ha Yoon Song, Han-gyoo Kim
    Cooperative Routers against DoS Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:204-213 [Conf]
  19. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
    Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:214-225 [Conf]
  20. Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos
    Malicious ICMP Tunneling: Defense against the Vulnerability. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:226-235 [Conf]
  21. Sébastien Canard, Jacques Traoré
    On Fair E-cash Systems Based on Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:237-248 [Conf]
  22. Andreas Pashalidis, Chris J. Mitchell
    A Taxonomy of Single Sign-On Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:249-264 [Conf]
  23. Jaechul Sung, Deukjo Hong, Sangjin Lee
    Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:265-273 [Conf]
  24. Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
    Key Recovery Attacks on NTRU without Ciphertext Validation Routine. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:274-284 [Conf]
  25. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Permanent Fault Attack on the Parameters of RSA with CRT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:285-296 [Conf]
  26. Adam Young, Moti Yung
    Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:297-311 [Conf]
  27. Fangguo Zhang, Kwangjo Kim
    Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:312-323 [Conf]
  28. Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
    Digital Signature Schemes with Restriction on Signing Capability. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:324-335 [Conf]
  29. Kei Kawauchi, Mitsuru Tada
    On the Extract Security of Multi-signature Schemes Based on RSA. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:336-349 [Conf]
  30. Ivan Damgård, Mads Jurik
    A Length-Flexible Threshold Cryptosystem with Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:350-364 [Conf]
  31. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai
    Separating Encryption and Key Issuance in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:365-376 [Conf]
  32. Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee
    An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:377-386 [Conf]
  33. Josef Pieprzyk, David Pointcheval
    Josef Pieprzyk, David Pointcheval. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:387-401 [Conf]
  34. Li Gong
    Is Cross-Platform Security Possible? [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:402- [Conf]
  35. Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith
    A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:403-415 [Conf]
  36. Feng Bao
    Cryptanalysis of a New Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:416-427 [Conf]
  37. Chik How Tan, Xun Yi, Chee Kheong Siew
    A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:428-442 [Conf]
  38. Ali Kanso
    Clock-Controlled Shrinking Generator of Feedback Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:443-451 [Conf]
  39. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
    EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:452-463 [Conf]
  40. Vanesa Daza, Javier Herranz, Germán Sáez
    Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:464-475 [Conf]
  41. Taekyoung Kwon
    Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:476-487 [Conf]
  42. Hwankoo Kim, Sang-Jae Moon
    Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:488-497 [Conf]
  43. Khoongming Khoo, Guang Gong
    New Constructions for Resilient and Highly Nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:498-509 [Conf]
  44. Toshihiko Matsuo, Kaoru Kurosawa
    On Parallel Hash Functions Based on Block-Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:510-521 [Conf]
  45. Swee-Huay Heng, Kaoru Kurosawa
    Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:522-531 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002