The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2001 (conf/acisp/2001)

  1. Yacov Yacobi
    A Few Thoughts on E-Commerce. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:1-2 [Conf]
  2. Karl Brincat, Chris J. Mitchell
    New CBC-MAC Forgery Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:3-14 [Conf]
  3. Amr M. Youssef, Guang Gong
    Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:15-20 [Conf]
  4. Erik Zenner, Matthias Krause, Stefan Lucks
    Improved Cryptanalysis of the Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:21-35 [Conf]
  5. Chris Pavlovski, Colin Boyd
    Attacks Based on Small Factors in Various Group Structures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:36-50 [Conf]
  6. Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo
    On Classifying Conference Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:51-59 [Conf]
  7. Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyunsook Cho
    Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:60-73 [Conf]
  8. Hwankoo Kim, Sang-Jae Moon
    New Public-Key Cryptosystem Using Divisor Class Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:74-83 [Conf]
  9. Andreas Meyer, Stefan Neis, Thomas Pfahler
    First Implementation of Cryptographic Protocols Based on Algebraic Number Fields. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:84-103 [Conf]
  10. Sung-Ming Yen
    Practical Key Recovery Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:104-114 [Conf]
  11. David May, Henk L. Muller, Nigel P. Smart
    Non-deterministic Processors. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:115-129 [Conf]
  12. Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves
    Personal Secure Booting. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:130-144 [Conf]
  13. Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe
    Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:145-158 [Conf]
  14. Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan
    A Strategy for MLS Workflow. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:159-175 [Conf]
  15. B. Clifford Neuman
    Condition-Driven Integration of Security Services. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:176- [Conf]
  16. Eun-Sun Cho, Sunho Hong, Sechang Oh, Hong-Jin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park
    SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:177-189 [Conf]
  17. Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu
    Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:190-205 [Conf]
  18. Akihiro Yamamura, Taiichi Saito
    Private Information Retrieval Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:206-220 [Conf]
  19. Kazumasa Omote, Atsuko Miyaji
    A Practical English Auction with One-Time Registration. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:221-234 [Conf]
  20. Shouichi Hirose, Susumu Yoshida
    A User Authentication Scheme with Identity and Location Privacy. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:235-246 [Conf]
  21. Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee
    An End-to-End Authentication Protocol in Wireless Application Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:247-259 [Conf]
  22. Akihiro Yamamura, Hirokazu Ishizuka
    Error Detection and Authentication in Quantum Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:260-273 [Conf]
  23. Chuchang Liu, Maris A. Ozols, Anthony Cant
    An Axiomatic Basis for Reasoning about Trust in PKIs. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:274-291 [Conf]
  24. Along Lin
    A Knowledge-Based Approach to Internet Authorizations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:292-304 [Conf]
  25. John Yesberg, Marie Henderson
    Applications of Trusted Review to Information Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:305-319 [Conf]
  26. Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee
    Network Security Modeling and Cyber Attack Simulation Methodology. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:320-333 [Conf]
  27. DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
    Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:334-343 [Conf]
  28. Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber
    Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:344-359 [Conf]
  29. Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson
    Improving the Availability of Time-Stamping Services. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:360-375 [Conf]
  30. Brian King
    Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:376-391 [Conf]
  31. Hossein Ghodosi, Josef Pieprzyk
    Democratic Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:392-402 [Conf]
  32. Ayako Maeda, Atsuko Miyaji, Mitsuru Tada
    Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:403-416 [Conf]
  33. Douglas R. Stinson, Reto Strobl
    Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:417-434 [Conf]
  34. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    How to Construct Fail-Stop Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:435-444 [Conf]
  35. Chik How Tan, Xun Yi, Chee Kheong Siew
    Signature Schemes Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:445-459 [Conf]
  36. Toru Nakanishi, Yuji Sugiyama
    Anonymous Statistical Survey of Attributes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:460-473 [Conf]
  37. Byoungcheon Lee, Heesun Kim, Kwangjo Kim
    Secure Mobile Agent Using Strong Non-designated Proxy Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:474- [Conf]
  38. Colin Boyd, Paul Montague, Khanh Quoc Nguyen
    Elliptic Curve Based Password Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:487-501 [Conf]
  39. André Weimerskirch, Christof Paar, Sheueling Chang Shantz
    Elliptic Curve Cryptography on a Palm OS Device. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:502-513 [Conf]
  40. Kyungah Shim
    Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:514-520 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002