


default search action
13. ACISP 2008: Wollongong, Australia
- Yi Mu, Willy Susilo

, Jennifer Seberry:
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings. Lecture Notes in Computer Science 5107, Springer 2008, ISBN 978-3-540-69971-2 - Xavier Boyen:

New Paradigms for Password Security. 1-5 - Sebastian Gajek, Mark Manulis, Jörg Schwenk:

Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. 6-20 - Manuel Barbosa

, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa:
Secure Biometric Authentication with Improved Accuracy. 21-36 - Jiayuan Sui, Douglas R. Stinson:

A Critical Analysis and Improvement of AACS Drive-Host Authentication. 37-52 - Alfred Menezes, Berkant Ustaoglu

:
Comparing the Pre- and Post-specified Peer Models for Key Agreement. 53-68 - Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:

Efficient One-Round Key Exchange in the Standard Model. 69-83 - Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:

On the Improvement of the BDF Attack on LSBS-RSA. 84-97 - Takato Hirano, Koichiro Wada, Keisuke Tanaka:

Public-Key Cryptosystems with Primitive Power Roots of Unity. 98-112 - Isamu Teranishi, Wakaha Ogata

:
Relationship between Two Approaches for Defining the Standard Model PA-ness. 113-127 - Jacek Cichon

, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model. 128-140 - Huafei Zhu:

Fully-Simulatable Oblivious Set Transfer. 141-154 - Qingsong Ye, Huaxiong Wang, Josef Pieprzyk

, Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets. 155-169 - Arpita Patra, Ashish Choudhary

, Madhu Vaidyanathan, C. Pandu Rangan:
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary. 170-186 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:

Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. 187-202 - Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:

Multidimensional Linear Cryptanalysis of Reduced Round Serpent. 203-215 - Lei Zhang, Wentao Zhang, Wenling Wu:

Cryptanalysis of Reduced-Round SMS4 Block Cipher. 216-229 - Peng Wang

, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Unprovable Security of 2-Key XCBC. 230-238 - Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin:

Looking Back at a New Hash Function. 239-253 - Somitra Kumar Sanadhya

, Palash Sarkar:
Non-linear Reduced Round Attacks against SHA-2 Hash Family. 254-266 - Florian Mendel

, Martin Schläffer:
Collisions for Round-Reduced LAKE. 267-281 - Yu Sasaki, Kazumaro Aoki:

Preimage Attacks on Step-Reduced MD5. 282-296 - Risto M. Hakala, Kaisa Nyberg:

Linear Distinguishing Attack on Shannon. 297-305 - Subhamoy Maitra, Goutam Paul:

Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. 306-320 - Yuseop Lee, Kitae Jeong, Jaechul Sung

, Seokhie Hong:
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. 321-335 - V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar:

Signature Generation and Detection of Malware Families. 336-349 - Sunghyun Kim, Heejo Lee:

Reducing Payload Scans for Attack Signature Matching Using Rule Classification. 350-360 - Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao:

Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. 361-375 - Pankaj Kohli, Bezawada Bruhadeshwar:

FormatShield: A Binary Rewriting Defense against Format String Attacks. 376-390 - Min Li, Hua Wang

, Ashley W. Plank, Jianming Yong
:
Advanced Permission-Role Relationship in Role-Based Access Control. 391-403 - B. John Oommen, Ebaa Fayyoumi

:
Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases. 404-418 - Silvana Medos, Serdar Boztas:

Montgomery Residue Representation Fault-Tolerant Computation in GF(2k). 419-432 - Christophe Doche

, Laurent Habsieger:
A Tree-Based Approach for Computing Double-Base Chains. 433-446 - Reza Rezaeian Farashahi:

Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves. 447-462 - Christophe Nègre, Thomas Plantard:

Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation. 463-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














