Conferences in DBLP
Adrian Spalka , Armin B. Cremers , Hartmut Lehmler Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:1-17 [Conf ] Richard Au , Mark Looi , Paul Ashley Towards a New Authorisation Paradigm for Extranets. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:18-29 [Conf ] Lawrie Brown Custom Safety Policies in Safe Erlang. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:30-40 [Conf ] Heajoung Yoo , Seokhie Hong , Sangjin Lee , Jong In Lim , Okyeon Yi , Maenghee Sung A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:41-48 [Conf ] Joonsang Baek , Byoungcheon Lee , Kwangjo Kim Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:49-58 [Conf ] Yasuyuki Sakai , Kouichi Sakurai Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:59-73 [Conf ] Chandana Gamage , Jussipekka Leiwo , Yuliang Zheng High Performance Agile Crypto Modules. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:74-88 [Conf ] Agung Prasetijo , Paul Ashley , Mark Looi , Andrew Clark , Gary Gaskell A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:89-96 [Conf ] Hongjun Wu , Feng Bao , Dingfeng Ye , Robert H. Deng Cryptanalysis of the m -Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:97-111 [Conf ] Lauren May , Lyta Penna , Andrew Clark An Implementation of Bitsliced DES on the Pentium MMXTM Processor. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:112-122 [Conf ] Panagiotis Sklavos , Aggelos Varvitsiotis , Despina Polemi Securing Large E-Commerce Networks. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:123-133 [Conf ] Ernest Foo , Colin Boyd Passive Entities: A Strategy for Electronic Payment Design. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:134-148 [Conf ] Juanma González Nieto , Kapali Viswanathan , Colin Boyd , Ed Dawson Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:149-162 [Conf ] Masayuki Abe , Masayuki Kanda A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:163-177 [Conf ] Hartono Kurnio , Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang Key Management for Secure Multicast with Dynamic Controller. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:178-190 [Conf ] Audun Jøsang , Ingar Glenn Pedersen , Dean Povey PKI Seeks a Trusting Relationship. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:191-205 [Conf ] Maris A. Ozols , Marie Henderson , Chuchang Liu , Anthony Cant The PKI Specification Dilemma: A Formal Solution. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:206-219 [Conf ] Jovan Dj. Golic Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:220-233 [Conf ] Niels Ferguson , Bruce Schneier , David Wagner Security Weaknesses in a Randomized Stream Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:234-241 [Conf ] John A. Clark , Jeremy Jacob Two-Stage Optimisation in the Design of Boolean Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:242-254 [Conf ] Zhu Hui , Daniel Tan A Novel Engine for Various Intrusion Detection Methods. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:255-265 [Conf ] G. R. Blakley , I. Borosh , Andreas Klappenecker Construction and Categories of Codes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:266-277 [Conf ] Hongjun Wu , Feng Bao , Dingfeng Ye , Robert H. Deng Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:278-288 [Conf ] Panayiotis Kotzanikolaou , Mike Burmester , Vassilios Chrissikopoulos Secure Transactions with Mobile Agents in Hostile Environments. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:289-297 [Conf ] Shirow Mitomi , Atsuko Miyaji A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:298-312 [Conf ] Natsume Matsuzaki , Jun Anzai , Tsutomu Matsumoto Light Weight Broadcast Exclusion Using Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:313-327 [Conf ] Hossein Ghodosi , Josef Pieprzyk Cheating Prevention in Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:328-341 [Conf ] Huaxiong Wang , Kwok-Yan Lam , Guozhen Xiao , Huanhui Zhao On Multiplicative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:342-351 [Conf ] Hiroshi Doi , Masahiro Mambo , Eiji Okamoto On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:352-367 [Conf ] Yi Mu , Vijay Varadharajan Fail-Stop Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:368-377 [Conf ] William D. Banks , Daniel Lieman , Igor Shparlinski An Extremely Small and Efficient Identification Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:378-384 [Conf ] Kouichi Sakurai , Shingo Miyazaki An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:385-399 [Conf ] Kook-Heui Lee , Sang-Jae Moon AKA Protocols for Mobile Communications. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:400-411 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:412-426 [Conf ] Khanh Quoc Nguyen , Jacques Traoré An Online Public Auction Protocol Protecting Bidder Privacy. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:427-442 [Conf ] Brian King Algorithms to Speed Up Computations in Threshold RSA. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:443-456 [Conf ] Ernest F. Brickell , Giovanni Di Crescenzo , Yair Frankel Sharing Block Ciphers. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:457-470 [Conf ] Bob Blakley , G. R. Blakley All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:471-476 [Conf ] Alan Underwood Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:477-486 [Conf ]