Search dblp for Publications

export results for "toc:db/conf/acisp/acisp2003.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acisp/AbeI03,
  author       = {Masayuki Abe and
                  Hideki Imai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Flaws in Some Robust Optimistic Mix-Nets},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_4},
  doi          = {10.1007/3-540-45067-X\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbeI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Arita03,
  author       = {Seigo Arita},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Addition Algorithm in Jacobian of C\({}_{\mbox{34}}\) Curve},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {93--105},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_9},
  doi          = {10.1007/3-540-45067-X\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Arita03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bao03,
  author       = {Feng Bao},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Cryptanalysis of a New Cellular Automata Cryptosystem},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_36},
  doi          = {10.1007/3-540-45067-X\_36},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Bao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BullSNZ03,
  author       = {Laurence Bull and
                  David McG. Squire and
                  Jan Newmarch and
                  Yuliang Zheng},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Grouping Verifiable Content for Selective Disclosure},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_1},
  doi          = {10.1007/3-540-45067-X\_1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BullSNZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CanardT03,
  author       = {S{\'{e}}bastien Canard and
                  Jacques Traor{\'{e}}},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On Fair E-cash Systems Based on Group Signature Schemes},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {237--248},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_21},
  doi          = {10.1007/3-540-45067-X\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CanardT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenY03,
  author       = {Chien{-}Ning Chen and
                  Sung{-}Ming Yen},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Differential Fault Analysis on {AES} Key Schedule and Some Coutnermeasures},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {118--129},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_11},
  doi          = {10.1007/3-540-45067-X\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DamgardJ03,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Length-Flexible Threshold Cryptosystem with Applications},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_30},
  doi          = {10.1007/3-540-45067-X\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DamgardJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DazaHS03,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Constructing General Dynamic Group Key Distribution Schemes with Decentralized
                  User Join},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {464--475},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_40},
  doi          = {10.1007/3-540-45067-X\_40},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DazaHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Gong03,
  author       = {Li Gong},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Is Cross-Platform Security Possible?},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {402},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_34},
  doi          = {10.1007/3-540-45067-X\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Gong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuPSLNS03,
  author       = {Jabeom Gu and
                  Sehyun Park and
                  Ohyoung Song and
                  Jaeil Lee and
                  Jaehoon Nah and
                  Sung Won Sohn},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Mobile {PKI:} {A} PKI-Based Authentication Framework for the Next
                  Generation Mobile Communications},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_16},
  doi          = {10.1007/3-540-45067-X\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuPSLNS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanCJPKR03,
  author       = {Dong{-}Guk Han and
                  Nam Su Chang and
                  Seok Won Jung and
                  Young{-}Ho Park and
                  Chang Han Kim and
                  Heuisu Ryu},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Cryptanalysis of the Full Version Randomized Addition-Subtraction
                  Chains},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_7},
  doi          = {10.1007/3-540-45067-X\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HanCJPKR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanHHK03,
  author       = {Daewan Han and
                  Jin Hong and
                  Jae Woo Han and
                  Daesung Kwon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Key Recovery Attacks on {NTRU} without Ciphertext Validation Routine},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {274--284},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_24},
  doi          = {10.1007/3-540-45067-X\_24},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanHHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaOMOMOGNI03,
  author       = {Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Itsuro Murota and
                  Go Ohtake and
                  Keigo Majima and
                  Kimiyuki Oyamada and
                  Seiichi Gohshi and
                  Seiichi Namba and
                  Hideki Imai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Separating Encryption and Key Issuance in Digital Rights Management
                  Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {365--376},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_31},
  doi          = {10.1007/3-540-45067-X\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanaokaOMOMOGNI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HengK03,
  author       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Square Hash with a Small Key Size},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {522--531},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_45},
  doi          = {10.1007/3-540-45067-X\_45},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HengK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HitchcockMCD03,
  author       = {Yvonne Hitchcock and
                  Paul Montague and
                  Gary Carter and
                  Ed Dawson},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {The Security of Fixed versus Random Elliptic Curves in Cryptography},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_6},
  doi          = {10.1007/3-540-45067-X\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HitchcockMCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangKL03,
  author       = {Yong Ho Hwang and
                  Chong Hee Kim and
                  Pil Joong Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Efficient Revocation Scheme with Minimal Message Length for Stateless
                  Receivers},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {377--386},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_32},
  doi          = {10.1007/3-540-45067-X\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangKLL03,
  author       = {Jung Yeon Hwang and
                  Hyun{-}Jeong Kim and
                  Dong Hoon Lee and
                  Jong In Lim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Digital Signature Schemes with Restriction on Signing Capability},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {324--335},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_28},
  doi          = {10.1007/3-540-45067-X\_28},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangKLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangYL03,
  author       = {Yong Ho Hwang and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {{EPA:} An Efficient Password-Based Protocal for Authenticated Key
                  Exchange},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {452--463},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_39},
  doi          = {10.1007/3-540-45067-X\_39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IwataYK03,
  author       = {Tetsu Iwata and
                  Tohru Yagi and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Pseudorandomness of {KASUMI} Type Permutations},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {130--141},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_12},
  doi          = {10.1007/3-540-45067-X\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IwataYK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kanso03,
  author       = {Ali Kanso},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Clock-Controlled Shrinking Generator of Feedback Shift Registers},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {443--451},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_38},
  doi          = {10.1007/3-540-45067-X\_38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kanso03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KawauchiT03,
  author       = {Kei Kawauchi and
                  Mitsuru Tada},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Extract Security of Multi-signature Schemes Based on {RSA}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {336--349},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_29},
  doi          = {10.1007/3-540-45067-X\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KawauchiT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KhooG03,
  author       = {Khoongming Khoo and
                  Guang Gong},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {New Constructions for Resilient and Highly Nonlinear Boolean Functions},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {498--509},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_43},
  doi          = {10.1007/3-540-45067-X\_43},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KhooG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimM03,
  author       = {Hwankoo Kim and
                  Sang{-}Jae Moon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic
                  Non-maximal Orders},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {488--497},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_42},
  doi          = {10.1007/3-540-45067-X\_42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KitazawaSM03,
  author       = {Shigeki Kitazawa and
                  Masakazu Soshi and
                  Atsuko Miyaji},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Evaluation of Anonymity of Practical Anonymous Communication Networks},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_2},
  doi          = {10.1007/3-540-45067-X\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KitazawaSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kwon03,
  author       = {Taekyoung Kwon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Robust Software Tokens - Yet Another Method for Securing User's Digital
                  Identity},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {476--487},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_41},
  doi          = {10.1007/3-540-45067-X\_41},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kwon03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsuoK03,
  author       = {Toshihiko Matsuo and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On Parallel Hash Functions Based on Block-Cipher},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {510--521},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_44},
  doi          = {10.1007/3-540-45067-X\_44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsuoK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NarayananRK03,
  author       = {Arvind Narayanan and
                  C. Pandu Rangan and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Practical Pay {TV} Schemes},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_17},
  doi          = {10.1007/3-540-45067-X\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Odlyzko03,
  author       = {Andrew M. Odlyzko},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {The Unsolvable Privacy Problem and Its Implications for Security Technologies},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {51--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_5},
  doi          = {10.1007/3-540-45067-X\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Odlyzko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PashalidisM03,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Taxonomy of Single Sign-On Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_22},
  doi          = {10.1007/3-540-45067-X\_22},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PashalidisM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengLR03,
  author       = {Tao Peng and
                  Christopher Leckie and
                  Kotagiri Ramamohanarao},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Detecting Distributed Denial of Service Attacks by Sharing Distributed
                  Beliefs},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_19},
  doi          = {10.1007/3-540-45067-X\_19},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengLR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Persiano03,
  author       = {Pino Persiano and
                  Ivan Visconti},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Anonymous Credential System and a Privacy-Aware {PKI}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_3},
  doi          = {10.1007/3-540-45067-X\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Persiano03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PieprzykP03,
  author       = {Josef Pieprzyk and
                  David Pointcheval},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Josef Pieprzyk, David Pointcheval},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {387--401},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_33},
  doi          = {10.1007/3-540-45067-X\_33},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PieprzykP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ReidCHS03,
  author       = {Jason Reid and
                  Ian Cheong and
                  Matthew Henricksen and
                  Jason Smith},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Novel Use of {RBAC} to Protect Privacy in Distributed Health Care
                  Information Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {403--415},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_35},
  doi          = {10.1007/3-540-45067-X\_35},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ReidCHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SinghNLS03,
  author       = {Abhishek Singh and
                  Ola Nordstr{\"{o}}m and
                  Chenghuai Lu and
                  Andr{\'{e}} L. M. dos Santos},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Malicious {ICMP} Tunneling: Defense against the Vulnerability},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {226--235},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_20},
  doi          = {10.1007/3-540-45067-X\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SinghNLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SongK03,
  author       = {Ha Yoon Song and
                  Han{-}gyoo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Cooperative Routers against DoS Attacks},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {204--213},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_18},
  doi          = {10.1007/3-540-45067-X\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SongK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SungHL03,
  author       = {Jaechul Sung and
                  Deukjo Hong and
                  Sangjin Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Key Recovery Attacks on the RMAC, TMAC, and {IACBC}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {265--273},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_23},
  doi          = {10.1007/3-540-45067-X\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SungHL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakenakaSK03,
  author       = {Masahiko Takenaka and
                  Takeshi Shimoyama and
                  Takeshi Koshiba},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Theoretical Analysis of chi\({}^{\mbox{2}}\) Attack on {RC6}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {142--153},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_13},
  doi          = {10.1007/3-540-45067-X\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TakenakaSK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TanYS03,
  author       = {Chik How Tan and
                  Xun Yi and
                  Chee Kheong Siew},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A {CCA2} Secure Key Encapsulation Scheme Based on 3rd Order Shift
                  Registers},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {428--442},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_37},
  doi          = {10.1007/3-540-45067-X\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TanYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TinBN03,
  author       = {Yiu Shing Terry Tin and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk
                  Approach},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_15},
  doi          = {10.1007/3-540-45067-X\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TinBN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangC03,
  author       = {Libin Wang and
                  Kefei Chen},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Typed Theory for Access Control and Information Flow Control in
                  Mobile Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {154--165},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_14},
  doi          = {10.1007/3-540-45067-X\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Douglas Stebila and
                  Sheueling Chang Shantz},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {79--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_8},
  doi          = {10.1007/3-540-45067-X\_8},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yen03,
  author       = {Sung{-}Ming Yen},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Amplified Differential Power Cryptanalysis on Rijndael Implementations
                  with Exponentially Fewer Power Traces},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {106--117},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_10},
  doi          = {10.1007/3-540-45067-X\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YenMH03,
  author       = {Sung{-}Ming Yen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Permanent Fault Attack on the Parameters of {RSA} with {CRT}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {285--296},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_25},
  doi          = {10.1007/3-540-45067-X\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YenMH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoungY03,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_26},
  doi          = {10.1007/3-540-45067-X\_26},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YoungY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear
                  Pairings},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {312--323},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_27},
  doi          = {10.1007/3-540-45067-X\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2003,
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X},
  doi          = {10.1007/3-540-45067-X},
  isbn         = {3-540-40515-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics