Conferences in DBLP
William Millan , Andrew Clark , Ed Dawson Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:1-11 [Conf ] Subhamoy Maitra , Palash Sarkar Enumeration of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:12-25 [Conf ] Chengxin Qu , Jennifer Seberry , Josef Pieprzyk On the Symmetric Property of Homogeneous Boolean Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:26-35 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:36-50 [Conf ] Seungwon Lee , Seong-Min Hong , Hyunsoo Yoon , Yookun Cho Accelerating Key Establishment Protocols for Mobile Communication. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:51-63 [Conf ] Chih-Hung Li , Josef Pieprzyk Conference Key Agreement from Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:64-76 [Conf ] Wai W. Fung , James W. Gray III On m -Permutation Protection Scheme Against Modification Attack. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:77-87 [Conf ] Jovan Dj. Golic , Andrew Clark , Ed Dawson Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:88-102 [Conf ] Willy Susilo , Reihaneh Safavi-Naini , Josef Pieprzyk Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:103-116 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:117-128 [Conf ] Hossein Ghodosi , Josef Pieprzyk Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:129-134 [Conf ] Siguna Müller On the Security of an RSA Based Encryption Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:135-148 [Conf ] Marc Gysin , Jennifer Seberry Generalised Cycling Attacks on RSA and Strong RSA Primes. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:149-163 [Conf ] Alexander Tiountchik , Elena Trichina RSA Acceleration with Field Programmable Gate Arrays. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:164-176 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:177-191 [Conf ] Shahrokh Saeednia , Hossein Ghodosi A Self-Certified Group-Oriented Cryptosystem Without a Combiner. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:192-201 [Conf ] Jeffrey Horton , Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:202-212 [Conf ] Paul Ashley , Bradley Broom , Mark Vandenwauver An Implementation of a Secure Version of NFS Including RBAC. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:213-227 [Conf ] Jacques Traoré Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:228-243 [Conf ] Colin Boyd , Ernest Foo , Chris Pavlovski Efficient Electronic Cash Using Batch Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:244-257 [Conf ] Jianying Zhou , Robert H. Deng , Feng Bao Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:258-269 [Conf ] Yun Bai , Vijay Varadharajan Authorization in Object Oriented Databases. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:270-280 [Conf ] Gregory Saunders , Michael Hitchens , Vijay Varadharajan An Analysis of Access Control Models. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:281-293 [Conf ] Arjen K. Lenstra Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:294-302 [Conf ] Dingyi Pei , Yuqiang Li , Yejing Wang , Reihaneh Safavi-Naini Characterization of Optimal Authentication Codes with Arbitration. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:303-313 [Conf ] Akihiro Yamamura A Functional Cryptosystem Using a Group Action. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:314-325 [Conf ]