The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2002 (conf/acisp/2002)

  1. Ingrid Biehl, Tsuyoshi Takagi
    A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:1-16 [Conf]
  2. Yanjiang Yang, Feng Bao, Robert H. Deng
    Security Analysis and Improvement of the Global Key Recovery System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:17-24 [Conf]
  3. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  4. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    A Secure Re-keying Scheme with Key Recovery Property. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:40-55 [Conf]
  5. Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto
    Modelling Trust Structures for Public Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:56-70 [Conf]
  6. Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild
    Size of Broadcast in Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:71-88 [Conf]
  7. Brian King
    Requirements for Group Independent Linear Threshold Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:89-106 [Conf]
  8. Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu
    Efficient Sharing of Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:107-120 [Conf]
  9. Josef Pieprzyk, Xian-Mo Zhang
    Cheating Prevention in Linear Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:121-135 [Conf]
  10. Wieland Fischer, Jean-Pierre Seifert
    Note on Fast Computation of Secret RSA Exponents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:136-143 [Conf]
  11. Leonid Reyzin, Natan Reyzin
    Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:144-153 [Conf]
  12. Hongjun Wu, Feng Bao
    Cryptanalysis of Stream Cipher COS(2, 128) Mode I. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:154-158 [Conf]
  13. David Soldera, Jennifer Seberry, Chengxin Qu
    The Analysis of Zheng-Seberry Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:159-168 [Conf]
  14. Hongjun Wu
    Cryptanalysis of Stream Cipher Alpha1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:169-175 [Conf]
  15. James Hughes
    A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:176-189 [Conf]
  16. YoungJu Choie, D. Yun
    Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:190-202 [Conf]
  17. Fangguo Zhang, Shengli Liu, Kwangjo Kim
    Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:203-213 [Conf]
  18. Yvonne Hitchcock, Paul Montague
    A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:214-225 [Conf]
  19. Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson
    Strengthening the Key Schedule of the AES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:226-240 [Conf]
  20. Ron Steinfeld, Joonsang Baek, Yuliang Zheng
    On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:241-256 [Conf]
  21. Matthew J. Warren, Lynn Margaret Batten
    Security Management: An Information Systems Setting. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:257-270 [Conf]
  22. Chun Ruan, Vijay Varadharajan
    Resolving Conflicts in Authorization Delegations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:271-285 [Conf]
  23. Michael Hitchens, Vijay Varadharajan, Gregory Saunders
    Policy Administration Domains. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:286-302 [Conf]
  24. Jianying Zhou
    Maintaining the Validity of Digital Signatures in B2B Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:303-315 [Conf]
  25. Francesc Sebé, Josep Domingo-Ferrer
    Short 3-Secure Fingerprinting Codes for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:316-327 [Conf]
  26. Mitsuru Tada
    An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:328-345 [Conf]
  27. Paul England, Marcus Peinado
    Authenticated Operation of Open Computing Devices. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:346-361 [Conf]
  28. Myungsun Kim, Kwangjo Kim
    A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:362-378 [Conf]
  29. Bimal K. Roy
    A Brief Outline of Research on Correlation Immune Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:379-394 [Conf]
  30. Yi Mu, Junqi Zhang, Vijay Varadharajan
    m out of n Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:395-405 [Conf]
  31. Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim
    On the Security of Reduced Versions of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:406-419 [Conf]
  32. Katsuyuki Okeya, Kouichi Sakurai
    On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:420-435 [Conf]
  33. Kouichi Sakurai, Tsuyoshi Takagi
    On the Security of a Modified Paillier Public-Key Primitive. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:436-448 [Conf]
  34. Biljana Cubaleska, Weidong Qiu, Markus Schneider
    How to Play Sherlock Holmes in the World of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:449-463 [Conf]
  35. Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang
    A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:464-481 [Conf]
  36. Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung
    Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:482-496 [Conf]
  37. M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan
    Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:497-512 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002