Conferences in DBLP
Per Kaijser A Review of the SESAME Development. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:1-8 [Conf ] Siguna Müller , Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:9-23 [Conf ] Paul Ashley , Mark Vandenwauver , Bradley Broom A Uniform Approach to Securing Unix Applications Using SESAME. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:24-35 [Conf ] Rainer Falk , Markus Trommer Integrated Management of Network and Host Based Security Mechanisms. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:36-47 [Conf ] Jeffrey Horton , Jennifer Seberry Covert Distributed Computing Using Java Through Web Spoofing. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:48-57 [Conf ] Xun Yi , Kwok-Yan Lam , Yongfei Han Differential Cryptanalysis of a Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:58-67 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh On Private-Key Cryptosystems Based on Product Codes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:68-79 [Conf ] Gary Carter , Ed Dawson , Lauren Nielsen Key Schedules of Iterative Block Ciphers. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:80-89 [Conf ] Uri Blumenthal , N. C. Hien , J. H. Rooney Low-Cost Secure Server Connection with Limited-Privilege Clients. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:90-98 [Conf ] Qi He , Katia P. Sycara , Zhongmin Su A Solution to Open Standard of PKI. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:99-110 [Conf ] Elke Franz , A. Graubner , Anja Jerichow , Andreas Pfitzmann Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:111-122 [Conf ] Jovan Dj. Golic , Renato Menicocci Correlation Attacks on Up/Down Cascades. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:123-134 [Conf ] Gregory G. Rose A Stream Cipher Based on Linear Feedback over GF(28 ). [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:135-146 [Conf ] Leone Simpson , Jovan Dj. Golic , Ed Dawson A Probabilistic Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:147-158 [Conf ] Reihaneh Safavi-Naini , Yejing Wang Bounds and Constructions for A3 -code with Multi-senders. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:159-168 [Conf ] Josef Pieprzyk , Cheng Xin Qu Rotation-Symmetric Functions and Fast Hashing. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:169-180 [Conf ] William Millan How to Improve the Nonlinearity of Bijective S-Boxes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:181-192 [Conf ] Rauli Kaksonen , Petri Mähönen Object Modeling of Cryptographic Algorithms with UML. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:193-204 [Conf ] Martin Manninger , Robert Schischka Adapting an Electronic Purse for Internet Payments. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:205-214 [Conf ] Goichiro Hanaoka , Yuliang Zheng , Hideki Imai LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:215-226 [Conf ] Marie Henderson Applications of Linearised and Sub-linearised Polynomials to Information Security. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:227-237 [Conf ] Mark Chen , Eric Hughes Protocol Failures Related to Order of Encryption and Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:238-249 [Conf ] Wai W. Fung , James W. Gray III Protection Against EEPROM Modification Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:250-260 [Conf ] Jaroslav Hruby Trends in Quantum Cryptography in Czech Republic. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:261-272 [Conf ] Yun Bai , Vijay Varadharajan A High Level Language for Conventional Access Control Models. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:273-283 [Conf ] Tuomas Aura Fast Access Control Decisions from Delegation Certificate Databases. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:284-295 [Conf ] Thomas Riechmann , Jürgen Kleinöder Meta Objects for Access Control: Role-Based Principals. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:296-307 [Conf ] Jonathon Tidswell , John Potter A Dynamically Typed Access Control Model. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:308-319 [Conf ] Shahrokh Saeednia , Reihaneh Safavi-Naini Efficient Identity-Based Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:320-331 [Conf ] Carsten Rudolph A Formal Model for Systematic Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:332-343 [Conf ] Colin Boyd , Anish Mathuria Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:344-355 [Conf ] Tage Stabell-Kulø , Arne Helme , Gianluca Dini Detecting Key-Dependencies. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:356-366 [Conf ] Hossein Ghodosi , Josef Pieprzyk , Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:367-378 [Conf ] Hossein Ghodosi , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang On Construction of Cumulative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:379-390 [Conf ] Yvo Desmedt , Brian King , Wataru Kishimoto , Kaoru Kurosawa A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:391-402 [Conf ] Agus Fanar Syukri , Eiji Okamoto , Masahiro Mambo A User Identification System Using Signature Written with Mouse. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:403-414 [Conf ] Narn-Yih Lee , Tzonelih Hwang , Chih-Hung Wang On Zhang's Nonrepudiable Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:415-422 [Conf ]