


default search action
1. ACISP 1996: Wollongong, NSW, Australia
- Josef Pieprzyk, Jennifer Seberry:

Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings. Lecture Notes in Computer Science 1172, Springer 1996, ISBN 3-540-61991-7
Invited Lecture 1
- Steve Orlowski:

The Changing Face of Information Technology Security. 1-13
Session 1: Authentication
- Thomas Hardjono, Jennifer Seberry:

Replicating the Kuperee authentication server for increased security and reliability. 14-26 - R. Taylor:

Non-repudiation without public-key. 27-37 - Yongfei Han:

Investigation of non-repudiation protocols. 38-47
Session 2: Secret Sharing
- Shin-Jia Hwang, Chin-Chen Chang:

A dynamic secret sharing scheme with cheater detection. 48-55 - Ari Renvall, Cunsheng Ding:

A nonlinear secret sharing scheme. 56-66 - Ari Renvall, Cunsheng Ding:

The access structure of some secret-sharing schemes. 67-78
Session 3: Encryption and Cryptographic Functions
- Chuan-Kun Wu, Ed Dawson:

On construction of resilient functions. 79-86 - Ed Dawson, He Jingmin:

Another approach to software key escrow encryption. 87-95 - Josef Pieprzyk

, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini:
Cryptography based on transcendental numbers. 96-107
Invited Lecture 2
- Eugene F. Troy:

Breakthroughs in Standardization of IT Security Criteria. 108-120
Session 4: Authentication Protocols
- Liqun Chen

, Dieter Gollmann, Chris J. Mitchell
:
Tailoring authentication protocols to match underlying mechanisms. 121-133 - Yi Mu, Vijay Varadharajan:

On the design of security protocols for mobile communications. 134-145 - Colin Boyd:

A Framework for Design of Key Establishment Protocols. 146-157
Session 5: Stream Ciphers
- Jovan Dj. Golic:

On period of multiplexed sequences. 158-168 - Jovan Dj. Golic:

Edit distance correlation attacks on clock-controlled combiners with memory. 169-181 - Miodrag J. Mihaljevic:

A faster cryptanalysis of the self-shrinking generator. 182-189
Session 6: Access Control
- Ahmad Baraani-Dastjerdi, Josef Pieprzyk

, Reihaneh Safavi-Naini:
Modeling a multi-level secure object-oriented database using views. 190-206 - Vijay Varadharajan, Phillip Allen:

Support for joint action based security policies. 207-218
Invited Lecture 3
- Ravi S. Sandhu:

Access Control: The Neglected Frontier. 219-227
Session 7: Security Models and Intrusion Detection
- Erland Jonsson, Mikael Andersson:

On the quantitative assessment of behavioural security. 228-241 - Ulf Gustafson, Erland Jonsson, Tomas Olovsson:

On the modelling of preventive security based on a PC network intrusion experiment. 242-252 - Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk

:
Evidential reasoning in network intrusion detection systems. 253-265
Session 8: Threshold Cryptography
- Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang:

A group-oriented (t, n) undeniable signature scheme without trusted center. 266-274 - Hossein Ghodosi, Josef Pieprzyk

, Chris Charnes, Reihaneh Safavi-Naini:
Cryptosystems for hierarchical groups. 275-286
Session 9: Hashing
- Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk

:
On selectable collisionful hash functions. 287-298 - Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk

:
On password-based authenticated key exchange using collisionful hash functions. 299-310
Session 10: Odds and Ends
- Babak Sadeghiyan, Javad Mohajeri:

A new universal test for bit strings. 311-319 - Yi Mu, Yuliang Zheng

:
An alternative model of quantum key agreement via photon coupling. 320-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














