The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
1999 (conf/acisp/1999)

  1. William Millan, Andrew Clark, Ed Dawson
    Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:1-11 [Conf]
  2. Subhamoy Maitra, Palash Sarkar
    Enumeration of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:12-25 [Conf]
  3. Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
    On the Symmetric Property of Homogeneous Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:26-35 [Conf]
  4. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:36-50 [Conf]
  5. Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho
    Accelerating Key Establishment Protocols for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:51-63 [Conf]
  6. Chih-Hung Li, Josef Pieprzyk
    Conference Key Agreement from Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:64-76 [Conf]
  7. Wai W. Fung, James W. Gray III
    On m-Permutation Protection Scheme Against Modification Attack. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:77-87 [Conf]
  8. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:88-102 [Conf]
  9. Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk
    Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:103-116 [Conf]
  10. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:117-128 [Conf]
  11. Hossein Ghodosi, Josef Pieprzyk
    Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:129-134 [Conf]
  12. Siguna Müller
    On the Security of an RSA Based Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:135-148 [Conf]
  13. Marc Gysin, Jennifer Seberry
    Generalised Cycling Attacks on RSA and Strong RSA Primes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:149-163 [Conf]
  14. Alexander Tiountchik, Elena Trichina
    RSA Acceleration with Field Programmable Gate Arrays. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:164-176 [Conf]
  15. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
    Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:177-191 [Conf]
  16. Shahrokh Saeednia, Hossein Ghodosi
    A Self-Certified Group-Oriented Cryptosystem Without a Combiner. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:192-201 [Conf]
  17. Jeffrey Horton, Jennifer Seberry
    Companion Viruses and the Macintosh: Threats and Countermeasures. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:202-212 [Conf]
  18. Paul Ashley, Bradley Broom, Mark Vandenwauver
    An Implementation of a Secure Version of NFS Including RBAC. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:213-227 [Conf]
  19. Jacques Traoré
    Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:228-243 [Conf]
  20. Colin Boyd, Ernest Foo, Chris Pavlovski
    Efficient Electronic Cash Using Batch Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:244-257 [Conf]
  21. Jianying Zhou, Robert H. Deng, Feng Bao
    Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:258-269 [Conf]
  22. Yun Bai, Vijay Varadharajan
    Authorization in Object Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:270-280 [Conf]
  23. Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    An Analysis of Access Control Models. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:281-293 [Conf]
  24. Arjen K. Lenstra
    Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:294-302 [Conf]
  25. Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini
    Characterization of Optimal Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:303-313 [Conf]
  26. Akihiro Yamamura
    A Functional Cryptosystem Using a Group Action. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:314-325 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002