Conferences in DBLP
Ingrid Biehl , Tsuyoshi Takagi A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:1-16 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Security Analysis and Improvement of the Global Key Recovery System. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:17-24 [Conf ] Andrew Clark , Ed Dawson , Joanne Fuller , Jovan Dj. Golic , Hoon Jae Lee , William Millan , Sang-Jae Moon , Leone Simpson The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:25-39 [Conf ] Hartono Kurnio , Reihaneh Safavi-Naini , Huaxiong Wang A Secure Re-keying Scheme with Key Recovery Property. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:40-55 [Conf ] Marie Henderson , Robert S. Coulter , Ed Dawson , Eiji Okamoto Modelling Trust Structures for Public Key Infrastructures. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:56-70 [Conf ] Susan G. Barwick , Wen-Ai Jackson , Keith M. Martin , Peter R. Wild Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:71-88 [Conf ] Brian King Requirements for Group Independent Linear Threshold Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:89-106 [Conf ] Krista Bennett , Christian Grothoff , Tzvetan Horozov , Ioana Patrascu Efficient Sharing of Encrypted Data. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:107-120 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:121-135 [Conf ] Wieland Fischer , Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:136-143 [Conf ] Leonid Reyzin , Natan Reyzin Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:144-153 [Conf ] Hongjun Wu , Feng Bao Cryptanalysis of Stream Cipher COS(2, 128) Mode I. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:154-158 [Conf ] David Soldera , Jennifer Seberry , Chengxin Qu The Analysis of Zheng-Seberry Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:159-168 [Conf ] Hongjun Wu Cryptanalysis of Stream Cipher Alpha1. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:169-175 [Conf ] James Hughes A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:176-189 [Conf ] YoungJu Choie , D. Yun Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq . [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:190-202 [Conf ] Fangguo Zhang , Shengli Liu , Kwangjo Kim Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:203-213 [Conf ] Yvonne Hitchcock , Paul Montague A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:214-225 [Conf ] Lauren May , Matthew Henricksen , William Millan , Gary Carter , Ed Dawson Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:226-240 [Conf ] Ron Steinfeld , Joonsang Baek , Yuliang Zheng On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:241-256 [Conf ] Matthew J. Warren , Lynn Margaret Batten Security Management: An Information Systems Setting. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:257-270 [Conf ] Chun Ruan , Vijay Varadharajan Resolving Conflicts in Authorization Delegations. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:271-285 [Conf ] Michael Hitchens , Vijay Varadharajan , Gregory Saunders Policy Administration Domains. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:286-302 [Conf ] Jianying Zhou Maintaining the Validity of Digital Signatures in B2B Applications. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:303-315 [Conf ] Francesc Sebé , Josep Domingo-Ferrer Short 3-Secure Fingerprinting Codes for Copyright Protection. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:316-327 [Conf ] Mitsuru Tada An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:328-345 [Conf ] Paul England , Marcus Peinado Authenticated Operation of Open Computing Devices. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:346-361 [Conf ] Myungsun Kim , Kwangjo Kim A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:362-378 [Conf ] Bimal K. Roy A Brief Outline of Research on Correlation Immune Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:379-394 [Conf ] Yi Mu , Junqi Zhang , Vijay Varadharajan m out of n Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:395-405 [Conf ] Sangwoo Park , Soo Hak Sung , Seongtaek Chee , Jongin Lim On the Security of Reduced Versions of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:406-419 [Conf ] Katsuyuki Okeya , Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:420-435 [Conf ] Kouichi Sakurai , Tsuyoshi Takagi On the Security of a Modified Paillier Public-Key Primitive. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:436-448 [Conf ] Biljana Cubaleska , Weidong Qiu , Markus Schneider How to Play Sherlock Holmes in the World of Mobile Agents. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:449-463 [Conf ] Dong-Guk Han , Hye-Young Park , Young-Ho Park , Sangjin Lee , Dong Hoon Lee , Hyungjin Yang A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:464-481 [Conf ] Hyun-Jeong Kim , Dong Hoon Lee , Moti Yung Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:482-496 [Conf ] M. V. N. Ashwin Kumar , K. Srinathan , C. Pandu Rangan Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:497-512 [Conf ]