Conferences in DBLP
Yacov Yacobi A Few Thoughts on E-Commerce. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:1-2 [Conf ] Karl Brincat , Chris J. Mitchell New CBC-MAC Forgery Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:3-14 [Conf ] Amr M. Youssef , Guang Gong Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:15-20 [Conf ] Erik Zenner , Matthias Krause , Stefan Lucks Improved Cryptanalysis of the Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:21-35 [Conf ] Chris Pavlovski , Colin Boyd Attacks Based on Small Factors in Various Group Structures. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:36-50 [Conf ] Shahrokh Saeednia , Reihaneh Safavi-Naini , Willy Susilo On Classifying Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:51-59 [Conf ] Ju-Sung Kang , Okyeon Yi , Dowon Hong , Hyunsook Cho Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:60-73 [Conf ] Hwankoo Kim , Sang-Jae Moon New Public-Key Cryptosystem Using Divisor Class Groups. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:74-83 [Conf ] Andreas Meyer , Stefan Neis , Thomas Pfahler First Implementation of Cryptographic Protocols Based on Algebraic Number Fields. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:84-103 [Conf ] Sung-Ming Yen Practical Key Recovery Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:104-114 [Conf ] David May , Henk L. Muller , Nigel P. Smart Non-deterministic Processors. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:115-129 [Conf ] Naomaru Itoi , William A. Arbaugh , Samuela J. Pollack , Daniel M. Reeves Personal Secure Booting. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:130-144 [Conf ] Hideaki Goto , Masahiro Mambo , Hiroki Shizuya , Yasuyoshi Watanabe Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:145-158 [Conf ] Vlad Ingar Wietrzyk , Makoto Takizawa , Vijay Varadharajan A Strategy for MLS Workflow. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:159-175 [Conf ] B. Clifford Neuman Condition-Driven Integration of Security Services. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:176- [Conf ] Eun-Sun Cho , Sunho Hong , Sechang Oh , Hong-Jin Yeh , Manpyo Hong , Cheol Won Lee , Hyundong Park , Chun-Sik Park SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:177-189 [Conf ] Feng Bao , Robert H. Deng , Peirong Feng , Yan Guo , Hongjun Wu Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:190-205 [Conf ] Akihiro Yamamura , Taiichi Saito Private Information Retrieval Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:206-220 [Conf ] Kazumasa Omote , Atsuko Miyaji A Practical English Auction with One-Time Registration. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:221-234 [Conf ] Shouichi Hirose , Susumu Yoshida A User Authentication Scheme with Identity and Location Privacy. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:235-246 [Conf ] Jong-Phil Yang , Weon Shin , Kyung Hyune Rhee An End-to-End Authentication Protocol in Wireless Application Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:247-259 [Conf ] Akihiro Yamamura , Hirokazu Ishizuka Error Detection and Authentication in Quantum Key Distribution. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:260-273 [Conf ] Chuchang Liu , Maris A. Ozols , Anthony Cant An Axiomatic Basis for Reasoning about Trust in PKIs. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:274-291 [Conf ] Along Lin A Knowledge-Based Approach to Internet Authorizations. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:292-304 [Conf ] John Yesberg , Marie Henderson Applications of Trusted Review to Information Security. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:305-319 [Conf ] Sung-Do Chi , Jong Sou Park , Ki-Chan Jung , Jang-Se Lee Network Security Modeling and Cyber Attack Simulation Methodology. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:320-333 [Conf ] DongGook Park , JungJoon Kim , Colin Boyd , Ed Dawson Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:334-343 [Conf ] Oliver Jung , Sven Kuhn , Christoph Ruland , Kai Wollenweber Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:344-359 [Conf ] Arne Ansper , Ahto Buldas , Märt Saarepera , Jan Willemson Improving the Availability of Time-Stamping Services. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:360-375 [Conf ] Brian King Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:376-391 [Conf ] Hossein Ghodosi , Josef Pieprzyk Democratic Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:392-402 [Conf ] Ayako Maeda , Atsuko Miyaji , Mitsuru Tada Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:403-416 [Conf ] Douglas R. Stinson , Reto Strobl Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:417-434 [Conf ] Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:435-444 [Conf ] Chik How Tan , Xun Yi , Chee Kheong Siew Signature Schemes Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:445-459 [Conf ] Toru Nakanishi , Yuji Sugiyama Anonymous Statistical Survey of Attributes. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:460-473 [Conf ] Byoungcheon Lee , Heesun Kim , Kwangjo Kim Secure Mobile Agent Using Strong Non-designated Proxy Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:474- [Conf ] Colin Boyd , Paul Montague , Khanh Quoc Nguyen Elliptic Curve Based Password Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:487-501 [Conf ] André Weimerskirch , Christof Paar , Sheueling Chang Shantz Elliptic Curve Cryptography on a Palm OS Device. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:502-513 [Conf ] Kyungah Shim Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:514-520 [Conf ]