The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2000 (conf/acisp/2000)

  1. Adrian Spalka, Armin B. Cremers, Hartmut Lehmler
    Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:1-17 [Conf]
  2. Richard Au, Mark Looi, Paul Ashley
    Towards a New Authorisation Paradigm for Extranets. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:18-29 [Conf]
  3. Lawrie Brown
    Custom Safety Policies in Safe Erlang. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:30-40 [Conf]
  4. Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung
    A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:41-48 [Conf]
  5. Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
    Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:49-58 [Conf]
  6. Yasuyuki Sakai, Kouichi Sakurai
    Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:59-73 [Conf]
  7. Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    High Performance Agile Crypto Modules. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:74-88 [Conf]
  8. Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
    A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:89-96 [Conf]
  9. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of the m-Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:97-111 [Conf]
  10. Lauren May, Lyta Penna, Andrew Clark
    An Implementation of Bitsliced DES on the Pentium MMXTM Processor. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:112-122 [Conf]
  11. Panagiotis Sklavos, Aggelos Varvitsiotis, Despina Polemi
    Securing Large E-Commerce Networks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:123-133 [Conf]
  12. Ernest Foo, Colin Boyd
    Passive Entities: A Strategy for Electronic Payment Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:134-148 [Conf]
  13. Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
    Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:149-162 [Conf]
  14. Masayuki Abe, Masayuki Kanda
    A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:163-177 [Conf]
  15. Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:178-190 [Conf]
  16. Audun Jøsang, Ingar Glenn Pedersen, Dean Povey
    PKI Seeks a Trusting Relationship. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:191-205 [Conf]
  17. Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant
    The PKI Specification Dilemma: A Formal Solution. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:206-219 [Conf]
  18. Jovan Dj. Golic
    Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:220-233 [Conf]
  19. Niels Ferguson, Bruce Schneier, David Wagner
    Security Weaknesses in a Randomized Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:234-241 [Conf]
  20. John A. Clark, Jeremy Jacob
    Two-Stage Optimisation in the Design of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:242-254 [Conf]
  21. Zhu Hui, Daniel Tan
    A Novel Engine for Various Intrusion Detection Methods. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:255-265 [Conf]
  22. G. R. Blakley, I. Borosh, Andreas Klappenecker
    Construction and Categories of Codes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:266-277 [Conf]
  23. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:278-288 [Conf]
  24. Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos
    Secure Transactions with Mobile Agents in Hostile Environments. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:289-297 [Conf]
  25. Shirow Mitomi, Atsuko Miyaji
    A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:298-312 [Conf]
  26. Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto
    Light Weight Broadcast Exclusion Using Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:313-327 [Conf]
  27. Hossein Ghodosi, Josef Pieprzyk
    Cheating Prevention in Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:328-341 [Conf]
  28. Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao
    On Multiplicative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:342-351 [Conf]
  29. Hiroshi Doi, Masahiro Mambo, Eiji Okamoto
    On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:352-367 [Conf]
  30. Yi Mu, Vijay Varadharajan
    Fail-Stop Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:368-377 [Conf]
  31. William D. Banks, Daniel Lieman, Igor Shparlinski
    An Extremely Small and Efficient Identification Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:378-384 [Conf]
  32. Kouichi Sakurai, Shingo Miyazaki
    An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:385-399 [Conf]
  33. Kook-Heui Lee, Sang-Jae Moon
    AKA Protocols for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:400-411 [Conf]
  34. Kapali Viswanathan, Colin Boyd, Ed Dawson
    A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:412-426 [Conf]
  35. Khanh Quoc Nguyen, Jacques Traoré
    An Online Public Auction Protocol Protecting Bidder Privacy. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:427-442 [Conf]
  36. Brian King
    Algorithms to Speed Up Computations in Threshold RSA. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:443-456 [Conf]
  37. Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel
    Sharing Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:457-470 [Conf]
  38. Bob Blakley, G. R. Blakley
    All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:471-476 [Conf]
  39. Alan Underwood
    Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:477-486 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002