Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2008.bht:"
@inproceedings{DBLP:conf/acisp/BarbosaBCS08, author = {Manuel Barbosa and Thierry Brouard and St{\'{e}}phane Cauchie and Sim{\~{a}}o Melo de Sousa}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Secure Biometric Authentication with Improved Accuracy}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {21--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_3}, doi = {10.1007/978-3-540-70500-0\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BarbosaBCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRSY08, author = {Olivier Billet and Matthew J. B. Robshaw and Yannick Seurin and Yiqun Lisa Yin}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Looking Back at a New Hash Function}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {239--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_18}, doi = {10.1007/978-3-540-70500-0\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient One-Round Key Exchange in the Standard Model}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {69--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_6}, doi = {10.1007/978-3-540-70500-0\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Boyen08, author = {Xavier Boyen}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {New Paradigms for Password Security}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {1--5}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_1}, doi = {10.1007/978-3-540-70500-0\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Boyen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CichonKK08, author = {Jacek Cichon and Marek Klonowski and Miroslaw Kutylowski}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Distributed Verification of Mixing - Local Forking Proofs Model}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {128--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_10}, doi = {10.1007/978-3-540-70500-0\_10}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CichonKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {187--202}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_14}, doi = {10.1007/978-3-540-70500-0\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DocheH08, author = {Christophe Doche and Laurent Habsieger}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {A Tree-Based Approach for Computing Double-Base Chains}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {433--446}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_32}, doi = {10.1007/978-3-540-70500-0\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DocheH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Farashahi08, author = {Reza Rezaeian Farashahi}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {447--462}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_33}, doi = {10.1007/978-3-540-70500-0\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Farashahi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GajekMS08, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {6--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_2}, doi = {10.1007/978-3-540-70500-0\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GajekMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HakalaN08, author = {Risto M. Hakala and Kaisa Nyberg}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Linear Distinguishing Attack on Shannon}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {297--305}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_22}, doi = {10.1007/978-3-540-70500-0\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HakalaN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HermelinCN08, author = {Miia Hermelin and Joo Yeon Cho and Kaisa Nyberg}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Multidimensional Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {203--215}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_15}, doi = {10.1007/978-3-540-70500-0\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HermelinCN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiranoWT08, author = {Takato Hirano and Koichiro Wada and Keisuke Tanaka}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Public-Key Cryptosystems with Primitive Power Roots of Unity}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {98--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_8}, doi = {10.1007/978-3-540-70500-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimL08, author = {Sunghyun Kim and Heejo Lee}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Reducing Payload Scans for Attack Signature Matching Using Rule Classification}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {350--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_26}, doi = {10.1007/978-3-540-70500-0\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KohliB08, author = {Pankaj Kohli and Bezawada Bruhadeshwar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {FormatShield: {A} Binary Rewriting Defense against Format String Attacks}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {376--390}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_28}, doi = {10.1007/978-3-540-70500-0\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KohliB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeJSH08, author = {Yuseop Lee and Kitae Jeong and Jaechul Sung and Seokhie Hong}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Related-Key Chosen {IV} Attacks on Grain-v1 and Grain-128}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {321--335}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_24}, doi = {10.1007/978-3-540-70500-0\_24}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeJSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiWPY08, author = {Min Li and Hua Wang and Ashley W. Plank and Jianming Yong}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Advanced Permission-Role Relationship in Role-Based Access Control}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {391--403}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_29}, doi = {10.1007/978-3-540-70500-0\_29}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiWPY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MaitraP08, author = {Subhamoy Maitra and Goutam Paul}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Recovering {RC4} Permutation from 2048 Keystream Bytes if jIs Stuck}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {306--320}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_23}, doi = {10.1007/978-3-540-70500-0\_23}, timestamp = {Sun, 17 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MaitraP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MedosB08, author = {Silvana Medos and Serdar Boztas}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {419--432}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_31}, doi = {10.1007/978-3-540-70500-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MedosB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MendelS08, author = {Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Collisions for Round-Reduced {LAKE}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {267--281}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_20}, doi = {10.1007/978-3-540-70500-0\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MendelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MenezesU08, author = {Alfred Menezes and Berkant Ustaoglu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Comparing the Pre- and Post-specified Peer Models for Key Agreement}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {53--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_5}, doi = {10.1007/978-3-540-70500-0\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MenezesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NegreP08, author = {Christophe N{\`{e}}gre and Thomas Plantard}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {463--477}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_34}, doi = {10.1007/978-3-540-70500-0\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NegreP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OommenF08, author = {B. John Oommen and Ebaa Fayyoumi}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {404--418}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_30}, doi = {10.1007/978-3-540-70500-0\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OommenF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatraCVR08, author = {Arpita Patra and Ashish Choudhary and Madhu Vaidyanathan and C. Pandu Rangan}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {170--186}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_13}, doi = {10.1007/978-3-540-70500-0\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatraCVR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SanadhyaS08, author = {Somitra Kumar Sanadhya and Palash Sarkar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Non-linear Reduced Round Attacks against {SHA-2} Hash Family}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {254--266}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_19}, doi = {10.1007/978-3-540-70500-0\_19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SanadhyaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SasakiA08, author = {Yu Sasaki and Kazumaro Aoki}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Preimage Attacks on Step-Reduced {MD5}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {282--296}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_21}, doi = {10.1007/978-3-540-70500-0\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SasakiA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08, author = {V. Sai Sathyanarayan and Pankaj Kohli and Bezawada Bruhadeshwar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Signature Generation and Detection of Malware Families}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {336--349}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_25}, doi = {10.1007/978-3-540-70500-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SathyanarayanKB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SuiS08, author = {Jiayuan Sui and Douglas R. Stinson}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {A Critical Analysis and Improvement of {AACS} Drive-Host Authentication}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {37--52}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_4}, doi = {10.1007/978-3-540-70500-0\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SuiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWWG08, author = {Hung{-}Min Sun and Mu{-}En Wu and Huaxiong Wang and Jian Guo}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Improvement of the {BDF} Attack on {LSBS-RSA}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {84--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_7}, doi = {10.1007/978-3-540-70500-0\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TeranishiO08, author = {Isamu Teranishi and Wakaha Ogata}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Relationship between Two Approaches for Defining the Standard Model PA-ness}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {113--127}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_9}, doi = {10.1007/978-3-540-70500-0\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TeranishiO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangFWZ08, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Unprovable Security of 2-Key {XCBC}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {230--238}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_17}, doi = {10.1007/978-3-540-70500-0\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangFWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenZWC08, author = {Yan Wen and Jinjing Zhao and Huaimin Wang and Jiannong Cao}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {361--375}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_27}, doi = {10.1007/978-3-540-70500-0\_27}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenZWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YeWPZ08, author = {Qingsong Ye and Huaxiong Wang and Josef Pieprzyk and Xian{-}Mo Zhang}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Disjointness Tests for Private Datasets}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {155--169}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_12}, doi = {10.1007/978-3-540-70500-0\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YeWPZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZW08, author = {Lei Zhang and Wentao Zhang and Wenling Wu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {216--229}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_16}, doi = {10.1007/978-3-540-70500-0\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Zhu08, author = {Huafei Zhu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Fully-Simulatable Oblivious Set Transfer}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {141--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_11}, doi = {10.1007/978-3-540-70500-0\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Zhu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2008, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0}, doi = {10.1007/978-3-540-70500-0}, isbn = {978-3-540-69971-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.