|
Conferences in DBLP
- Steve Orlowski
The Changing Face of Information Technology Security. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:1-13 [Conf]
- Thomas Hardjono, Jennifer Seberry
Replicating the Kuperee authentication server for increased security and reliability. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:14-26 [Conf]
- R. Taylor
Non-repudiation without public-key. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:27-37 [Conf]
- Yongfei Han
Investigation of non-repudiation protocols. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:38-47 [Conf]
- Shin-Jia Hwang, Chin-Chen Chang
A dynamic secret sharing scheme with cheater detection. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:48-55 [Conf]
- Ari Renvall, Cunsheng Ding
A nonlinear secret sharing scheme. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:56-66 [Conf]
- Ari Renvall, Cunsheng Ding
The access structure of some secret-sharing schemes. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:67-78 [Conf]
- Chuan-Kun Wu, Ed Dawson
On construction of resilient functions. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:79-86 [Conf]
- Ed Dawson, He Jingmin
Another approach to software key escrow encryption. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:87-95 [Conf]
- Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini
Cryptography based on transcendental numbers. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:96-107 [Conf]
- Eugene F. Troy
Breakthroughs in Standardization of IT Security Criteria. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:108-120 [Conf]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell
Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:121-133 [Conf]
- Yi Mu, Vijay Varadharajan
On the design of security protocols for mobile communications. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:134-145 [Conf]
- Colin Boyd
A Framework for Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:146-157 [Conf]
- Jovan Dj. Golic
On period of multiplexed sequences. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:158-168 [Conf]
- Jovan Dj. Golic
Edit distance correlation attacks on clock-controlled combiners with memory. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:169-181 [Conf]
- Miodrag J. Mihaljevic
A faster cryptanalysis of the self-shrinking generator. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:182-189 [Conf]
- Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini
Modeling a multi-level secure object-oriented database using views. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:190-206 [Conf]
- Vijay Varadharajan, Phillip Allen
Support for joint action based security policies. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:207-218 [Conf]
- Ravi S. Sandhu
Access Control: The Neglected Frontier. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:219-227 [Conf]
- Erland Jonsson, Mikael Andersson
On the quantitative assessment of behavioural security. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:228-241 [Conf]
- Ulf Gustafson, Erland Jonsson, Tomas Olovsson
On the modelling of preventive security based on a PC network intrusion experiment. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:242-252 [Conf]
- Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk
Evidential reasoning in network intrusion detection systems. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:253-265 [Conf]
- Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang
A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:266-274 [Conf]
- Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini
Cryptosystems for hierarchical groups. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:275-286 [Conf]
- Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
On selectable collisionful hash functions. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:287-298 [Conf]
- Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk
On password-based authenticated key exchange using collisionful hash functions. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:299-310 [Conf]
- Babak Sadeghiyan, Javad Mohajeri
A new universal test for bit strings. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:311-319 [Conf]
- Yi Mu, Yuliang Zheng
An alternative model of quantum key agreement via photon coupling. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:320-331 [Conf]
|