The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2004 (conf/acisp/2004)

  1. Shaoquan Jiang, Guang Gong
    Multi-service Oriented Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:1-11 [Conf]
  2. Tomoyuki Asano
    Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:12-23 [Conf]
  3. Vu Dong Tô, Reihaneh Safavi-Naini
    Linear Code Implies Public-Key Traitor Tracing with Revocation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:24-35 [Conf]
  4. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    TTS without Revocation Capability Secure Against CCA2. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:36-49 [Conf]
  5. Yan-Cheng Chang
    Single Database Private Information Retrieval with Logarithmic Communication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:50-61 [Conf]
  6. Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
    Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:62-73 [Conf]
  7. Gildas Avoine, Serge Vaudenay
    Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:74-85 [Conf]
  8. Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli
    NGSCB: A Trusted Open System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:86-97 [Conf]
  9. Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
    The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:98-109 [Conf]
  10. YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee
    Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:110-122 [Conf]
  11. Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
    The Related-Key Rectangle Attack - Application to SHACAL-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:123-136 [Conf]
  12. Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee
    Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:137-148 [Conf]
  13. Michael J. Jacobson Jr.
    The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:149-156 [Conf]
  14. Feng Bao
    Analysis of a Conference Scheme Under Active and Passive Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:157-163 [Conf]
  15. Zhiguo Wan, Shuhong Wang
    Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:164-175 [Conf]
  16. Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
    Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:176-187 [Conf]
  17. Serge Vaudenay
    Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:188-199 [Conf]
  18. Dae Hyun Yum, Pil Joong Lee
    Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:200-211 [Conf]
  19. Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
    Pseudorandomness of SPN-Type Transformations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:212-223 [Conf]
  20. Tetsu Iwata, Kaoru Kurosawa
    How to Re-use Round Function in Super-Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:224-235 [Conf]
  21. Kaoru Kurosawa, Toshihiko Matsuo
    How to Remove MAC from DHIES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:236-247 [Conf]
  22. Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum
    Symmetric Key Authentication Services Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:248-261 [Conf]
  23. Brian King, Ben Rubin
    Improvements to the Point Halving Algorithm. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:262-276 [Conf]
  24. Bo-Yin Yang, Jiun-Ming Chen
    Theoretical Analysis of XL over Small Fields. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:277-288 [Conf]
  25. Chae Hoon Lim
    A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:289-300 [Conf]
  26. Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
    A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:301-312 [Conf]
  27. Willy Susilo, Fangguo Zhang, Yi Mu
    Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:313-324 [Conf]
  28. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:325-335 [Conf]
  29. Toru Nakanishi, Yuji Sugiyama
    A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:336-347 [Conf]
  30. Zhenjie Huang, Yumin Wang
    Convertible Nominative Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:348-357 [Conf]
  31. Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
    Protocols with Security Proofs for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:358-369 [Conf]
  32. Steven D. Galbraith, Herbie J. Hopkins, Igor Shparlinski
    Secure Bilinear Diffie-Hellman Bits. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:370-378 [Conf]
  33. SungJun Min, Go Yamamoto, Kwangjo Kim
    Weak Property of Malleability in NTRUSign. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:379-390 [Conf]
  34. Arjen K. Lenstra, Tim Voss
    Information Security Risk Assessment, Aggregation, and Mitigation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:391-401 [Conf]
  35. Chun Ruan, Vijay Varadharajan
    A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:402-413 [Conf]
  36. Xi-Bin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:414-426 [Conf]
  37. Luke McAven, Reihaneh Safavi-Naini, Moti Yung
    Unconditionally Secure Encryption Under Strong Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:427-439 [Conf]
  38. Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
    ManTiCore: Encryption with Joint Cipher-State Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:440-453 [Conf]
  39. Dong-Guk Han, Jongin Lim, Kouichi Sakurai
    On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:454-465 [Conf]
  40. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:466-477 [Conf]
  41. Christophe Giraud, Erik Woodward Knudsen
    Fault Attacks on Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:478-491 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002