The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
1998 (conf/acisp/1998)

  1. Per Kaijser
    A Review of the SESAME Development. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:1-8 [Conf]
  2. Siguna Müller, Winfried B. Müller
    The Security of Public Key Cryptosystems Based on Integer Factorization. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:9-23 [Conf]
  3. Paul Ashley, Mark Vandenwauver, Bradley Broom
    A Uniform Approach to Securing Unix Applications Using SESAME. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:24-35 [Conf]
  4. Rainer Falk, Markus Trommer
    Integrated Management of Network and Host Based Security Mechanisms. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:36-47 [Conf]
  5. Jeffrey Horton, Jennifer Seberry
    Covert Distributed Computing Using Java Through Web Spoofing. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:48-57 [Conf]
  6. Xun Yi, Kwok-Yan Lam, Yongfei Han
    Differential Cryptanalysis of a Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:58-67 [Conf]
  7. Hung-Min Sun, Shiuh-Pyng Shieh
    On Private-Key Cryptosystems Based on Product Codes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:68-79 [Conf]
  8. Gary Carter, Ed Dawson, Lauren Nielsen
    Key Schedules of Iterative Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:80-89 [Conf]
  9. Uri Blumenthal, N. C. Hien, J. H. Rooney
    Low-Cost Secure Server Connection with Limited-Privilege Clients. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:90-98 [Conf]
  10. Qi He, Katia P. Sycara, Zhongmin Su
    A Solution to Open Standard of PKI. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:99-110 [Conf]
  11. Elke Franz, A. Graubner, Anja Jerichow, Andreas Pfitzmann
    Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:111-122 [Conf]
  12. Jovan Dj. Golic, Renato Menicocci
    Correlation Attacks on Up/Down Cascades. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:123-134 [Conf]
  13. Gregory G. Rose
    A Stream Cipher Based on Linear Feedback over GF(28). [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:135-146 [Conf]
  14. Leone Simpson, Jovan Dj. Golic, Ed Dawson
    A Probabilistic Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:147-158 [Conf]
  15. Reihaneh Safavi-Naini, Yejing Wang
    Bounds and Constructions for A3-code with Multi-senders. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:159-168 [Conf]
  16. Josef Pieprzyk, Cheng Xin Qu
    Rotation-Symmetric Functions and Fast Hashing. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:169-180 [Conf]
  17. William Millan
    How to Improve the Nonlinearity of Bijective S-Boxes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:181-192 [Conf]
  18. Rauli Kaksonen, Petri Mähönen
    Object Modeling of Cryptographic Algorithms with UML. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:193-204 [Conf]
  19. Martin Manninger, Robert Schischka
    Adapting an Electronic Purse for Internet Payments. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:205-214 [Conf]
  20. Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:215-226 [Conf]
  21. Marie Henderson
    Applications of Linearised and Sub-linearised Polynomials to Information Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:227-237 [Conf]
  22. Mark Chen, Eric Hughes
    Protocol Failures Related to Order of Encryption and Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:238-249 [Conf]
  23. Wai W. Fung, James W. Gray III
    Protection Against EEPROM Modification Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:250-260 [Conf]
  24. Jaroslav Hruby
    Trends in Quantum Cryptography in Czech Republic. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:261-272 [Conf]
  25. Yun Bai, Vijay Varadharajan
    A High Level Language for Conventional Access Control Models. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:273-283 [Conf]
  26. Tuomas Aura
    Fast Access Control Decisions from Delegation Certificate Databases. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:284-295 [Conf]
  27. Thomas Riechmann, Jürgen Kleinöder
    Meta Objects for Access Control: Role-Based Principals. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:296-307 [Conf]
  28. Jonathon Tidswell, John Potter
    A Dynamically Typed Access Control Model. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:308-319 [Conf]
  29. Shahrokh Saeednia, Reihaneh Safavi-Naini
    Efficient Identity-Based Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:320-331 [Conf]
  30. Carsten Rudolph
    A Formal Model for Systematic Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:332-343 [Conf]
  31. Colin Boyd, Anish Mathuria
    Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:344-355 [Conf]
  32. Tage Stabell-Kulø, Arne Helme, Gianluca Dini
    Detecting Key-Dependencies. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:356-366 [Conf]
  33. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret Sharing in Multilevel and Compartmented Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:367-378 [Conf]
  34. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    On Construction of Cumulative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:379-390 [Conf]
  35. Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa
    A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:391-402 [Conf]
  36. Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo
    A User Identification System Using Signature Written with Mouse. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:403-414 [Conf]
  37. Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang
    On Zhang's Nonrepudiable Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:415-422 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002