The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
1996 (conf/acisp/1996)

  1. Steve Orlowski
    The Changing Face of Information Technology Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:1-13 [Conf]
  2. Thomas Hardjono, Jennifer Seberry
    Replicating the Kuperee authentication server for increased security and reliability. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:14-26 [Conf]
  3. R. Taylor
    Non-repudiation without public-key. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:27-37 [Conf]
  4. Yongfei Han
    Investigation of non-repudiation protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:38-47 [Conf]
  5. Shin-Jia Hwang, Chin-Chen Chang
    A dynamic secret sharing scheme with cheater detection. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:48-55 [Conf]
  6. Ari Renvall, Cunsheng Ding
    A nonlinear secret sharing scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:56-66 [Conf]
  7. Ari Renvall, Cunsheng Ding
    The access structure of some secret-sharing schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:67-78 [Conf]
  8. Chuan-Kun Wu, Ed Dawson
    On construction of resilient functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:79-86 [Conf]
  9. Ed Dawson, He Jingmin
    Another approach to software key escrow encryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:87-95 [Conf]
  10. Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini
    Cryptography based on transcendental numbers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:96-107 [Conf]
  11. Eugene F. Troy
    Breakthroughs in Standardization of IT Security Criteria. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:108-120 [Conf]
  12. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:121-133 [Conf]
  13. Yi Mu, Vijay Varadharajan
    On the design of security protocols for mobile communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:134-145 [Conf]
  14. Colin Boyd
    A Framework for Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:146-157 [Conf]
  15. Jovan Dj. Golic
    On period of multiplexed sequences. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:158-168 [Conf]
  16. Jovan Dj. Golic
    Edit distance correlation attacks on clock-controlled combiners with memory. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:169-181 [Conf]
  17. Miodrag J. Mihaljevic
    A faster cryptanalysis of the self-shrinking generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:182-189 [Conf]
  18. Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Modeling a multi-level secure object-oriented database using views. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:190-206 [Conf]
  19. Vijay Varadharajan, Phillip Allen
    Support for joint action based security policies. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:207-218 [Conf]
  20. Ravi S. Sandhu
    Access Control: The Neglected Frontier. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:219-227 [Conf]
  21. Erland Jonsson, Mikael Andersson
    On the quantitative assessment of behavioural security. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:228-241 [Conf]
  22. Ulf Gustafson, Erland Jonsson, Tomas Olovsson
    On the modelling of preventive security based on a PC network intrusion experiment. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:242-252 [Conf]
  23. Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk
    Evidential reasoning in network intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:253-265 [Conf]
  24. Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang
    A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:266-274 [Conf]
  25. Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini
    Cryptosystems for hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:275-286 [Conf]
  26. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    On selectable collisionful hash functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:287-298 [Conf]
  27. Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
    On password-based authenticated key exchange using collisionful hash functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:299-310 [Conf]
  28. Babak Sadeghiyan, Javad Mohajeri
    A new universal test for bit strings. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:311-319 [Conf]
  29. Yi Mu, Yuliang Zheng
    An alternative model of quantum key agreement via photon coupling. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:320-331 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002