The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2005 (conf/acisp/2005)

  1. Bob Blakley, G. R. Blakley
    All Sail, No Anchor III: Risk Aggregation and Time's Arrow. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:1-16 [Conf]
  2. Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam
    Traversing Middleboxes with the Host Identity Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:17-28 [Conf]
  3. Phillip Pudney, Jill Slay
    An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:29-39 [Conf]
  4. Vipul Goyal, Rohit Tripathy
    An Efficient Solution to the ARP Cache Poisoning Problem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:40-51 [Conf]
  5. Scott Contini, Igor Shparlinski
    On Stern's Attack Against Secret Truncated Linear Congruential Generators. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:52-60 [Conf]
  6. Atsuko Miyaji, Yuuki Takano
    On the Success Probability of chi2-attack on RC6. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:61-74 [Conf]
  7. Souradyuti Paul, Bart Preneel
    Solving Systems of Differential Equations of Addition. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:75-88 [Conf]
  8. Tomoyuki Asano, Kazuya Kamio
    A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:89-100 [Conf]
  9. Ratna Dutta, Rana Barua
    Dynamic Group Key Agreement in Tree-Based Setting. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:101-112 [Conf]
  10. C. K. Wong, Agnes Chan
    Immediate Data Authentication for Multicast in Resource Constrained Network. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:113-121 [Conf]
  11. Christophe Doche
    Redundant Trinomials for Finite Fields of Characteristic 2. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:122-133 [Conf]
  12. Soonhak Kwon
    Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:134-145 [Conf]
  13. Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
    A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:146-157 [Conf]
  14. Ming Yao, Kun Peng, Ed Dawson
    Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:158-169 [Conf]
  15. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
    An Improved Execution Integrity Solution for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:170-183 [Conf]
  16. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
    RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:184-194 [Conf]
  17. Jiqiang Lv, Yongfei Han
    Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:195-206 [Conf]
  18. Régis Bevan
    Improved Zero Value Attack on XTR. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:207-217 [Conf]
  19. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:218-229 [Conf]
  20. Tim McComb, Luke Wildman
    SIFA: A Tool for Evaluation of High-Grade Security Devices. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:230-241 [Conf]
  21. Russell Ang, Reihaneh Safavi-Naini, Luke McAven
    Cancelable Key-Based Fingerprint Templates. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:242-252 [Conf]
  22. Alexander W. Dent
    Hybrid Signcryption Schemes with Insider Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:253-266 [Conf]
  23. Arjen K. Lenstra, Benne de Weger
    On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:267-279 [Conf]
  24. Steven D. Galbraith, Chris Heneghan, James F. McKee
    Tunable Balancing of RSA. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:280-292 [Conf]
  25. Celia Li, Cungang Yang, Richard Cheung
    Key Management for Role Hierarchy in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:293-302 [Conf]
  26. Shujing Wang, Yan Zhang
    A Formalization of Distributed Authorization with Delegation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:303-315 [Conf]
  27. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Two Improved Partially Blind Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:316-328 [Conf]
  28. Willy Susilo, Yi Mu
    On the Security of Nominative Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:329-335 [Conf]
  29. Adrian McCullagh, William J. Caelli
    Who Goes There? Internet Banking: A Matter of Risk and Reward. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:336-357 [Conf]
  30. Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Role Activation Management in Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:358-369 [Conf]
  31. Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou
    VO-Sec: An Access Control Framework for Dynamic Virtual Organization. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:370-381 [Conf]
  32. Brian King
    An Efficient Implementation of a Threshold RSA Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:382-393 [Conf]
  33. Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague
    GBD Threshold Cryptography with an Application to RSA Key Recovery. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:394-405 [Conf]
  34. Toshiyuki Isshiki, Keisuke Tanaka
    An (n-t)-out-of-n Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:406-416 [Conf]
  35. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Deposit-Case Attack Against Secure Roaming. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:417-428 [Conf]
  36. Kim-Kwang Raymond Choo, Yvonne Hitchcock
    Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:429-442 [Conf]
  37. Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki
    Group Signature Schemes with Membership Revocation for Large Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:443-454 [Conf]
  38. Jun Furukawa, Hideki Imai
    An Efficient Group Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:455-467 [Conf]
  39. Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
    Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:468-480 [Conf]
  40. Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
    Analysis of the HIP Base Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:481-493 [Conf]
  41. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo
    ID-based Authenticated Key Agreement for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:494-505 [Conf]
  42. Xingyang Guo, Quan Zhang, Chaojing Tang
    On the Security of Two Key-Updating Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:506-517 [Conf]
  43. Bo-Yin Yang, Jiun-Ming Chen
    Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:518-531 [Conf]
  44. Yvo Desmedt
    Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:532-536 [Conf]
  45. Yanjiang Yang, Feng Bao, Robert H. Deng
    Security Analysis and Fix of an Anonymous Credential System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:537-547 [Conf]
  46. Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
    Counting Abuses Using Flexible Off-line Credentials. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:548-559 [Conf]
  47. Chris J. Mitchell
    Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:560-571 [Conf]
  48. William Millan
    New Cryptographic Applications of Boolean Function Equivalence Classes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:572-583 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002