The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2006 (conf/acisp/2006)

  1. Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong
    Algebraic Attacks on Clock-Controlled Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:1-16 [Conf]
  2. Jacques J. A. Fournier, Michael Tunstall
    Cache Based Power Analysis Attacks on AES. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:17-28 [Conf]
  3. Joo Yeon Cho, Josef Pieprzyk
    Distinguishing Attack on SOBER-128 with Linear Masking. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:29-39 [Conf]
  4. An Braeken, Joseph Lano, Bart Preneel
    Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:40-51 [Conf]
  5. Matthew Henricksen, Ed Dawson
    Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:52-63 [Conf]
  6. Leonie Ruth Simpson, Matthew Henricksen
    Improved Cryptanalysis of MAG. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:64-75 [Conf]
  7. Nicolas Courtois, Blandine Debraize, Eric Garrido
    On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:76-86 [Conf]
  8. A. Lakshminarayanan, T. L. Lim
    Augmented Certificate Revocation Lists. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:87-98 [Conf]
  9. Shidi Xu, Yi Mu, Willy Susilo
    Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:99-110 [Conf]
  10. Anh-Quynh Nguyen, Yoshiyasu Takefuji
    Towards an Invisible Honeypot Monitoring System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:111-122 [Conf]
  11. Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai
    Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:123-135 [Conf]
  12. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:136-147 [Conf]
  13. Huafei Zhu, Feng Bao
    More on Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:148-158 [Conf]
  14. Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu
    API Monitoring System for Defeating Worms and Exploits in MS-Windows System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:159-170 [Conf]
  15. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    Hiding Circuit Topology from Unbounded Reverse Engineers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:171-182 [Conf]
  16. John W. Holford, William J. Caelli
    The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:183-194 [Conf]
  17. Shanshan Duan, Zhenfu Cao
    Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:195-206 [Conf]
  18. Kenneth G. Paterson, Jacob C. N. Schuldt
    Efficient Identity-Based Signatures Secure in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:207-222 [Conf]
  19. Man Ho Au, Willy Susilo, Siu-Ming Yiu
    Event-Oriented k-Times Revocable-iff-Linked Group Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:223-234 [Conf]
  20. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng
    Key Replacement Attack Against a Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:235-246 [Conf]
  21. Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto
    A Novel Range Test. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:247-258 [Conf]
  22. Shaoquan Jiang
    Efficient Primitives from Exponentiation in Zp. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:259-270 [Conf]
  23. Ryotaro Hayashi, Keisuke Tanaka
    PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:271-282 [Conf]
  24. Raphael Overbeck
    Statistical Decoding Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:283-294 [Conf]
  25. Mike Burmester, Tri Van Le, Breno de Medeiros
    Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:295-312 [Conf]
  26. Huafei Zhu, Feng Bao
    Oblivious Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:313-323 [Conf]
  27. Ebaa Fayyoumi, B. John Oommen
    On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:324-335 [Conf]
  28. Eike Kiltz, David Galindo
    Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:336-347 [Conf]
  29. Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
    Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:348-359 [Conf]
  30. Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa
    Tag-KEM from Set Partial Domain One-Way Permutations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:360-370 [Conf]
  31. Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
    An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:371-382 [Conf]
  32. Isaac Agudo, Javier Lopez, José A. Montenegro
    Graphical Representation of Authorization Policies for Weighted Credentials. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:383-394 [Conf]
  33. Yin Yin, Li Bao
    Secure Cross-Realm C2C-PAKE Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:395-406 [Conf]
  34. Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
    Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:407-420 [Conf]
  35. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:421-431 [Conf]
  36. Katsuyuki Okeya
    Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:432-443 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002