Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2003.bht:"
@inproceedings{DBLP:conf/acisp/AbeI03, author = {Masayuki Abe and Hideki Imai}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Flaws in Some Robust Optimistic Mix-Nets}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {39--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_4}, doi = {10.1007/3-540-45067-X\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbeI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Arita03, author = {Seigo Arita}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Addition Algorithm in Jacobian of C\({}_{\mbox{34}}\) Curve}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {93--105}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_9}, doi = {10.1007/3-540-45067-X\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Arita03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bao03, author = {Feng Bao}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Cryptanalysis of a New Cellular Automata Cryptosystem}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {416--427}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_36}, doi = {10.1007/3-540-45067-X\_36}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Bao03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BullSNZ03, author = {Laurence Bull and David McG. Squire and Jan Newmarch and Yuliang Zheng}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Grouping Verifiable Content for Selective Disclosure}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {1--12}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_1}, doi = {10.1007/3-540-45067-X\_1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BullSNZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CanardT03, author = {S{\'{e}}bastien Canard and Jacques Traor{\'{e}}}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On Fair E-cash Systems Based on Group Signature Schemes}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {237--248}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_21}, doi = {10.1007/3-540-45067-X\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CanardT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenY03, author = {Chien{-}Ning Chen and Sung{-}Ming Yen}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Differential Fault Analysis on {AES} Key Schedule and Some Coutnermeasures}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {118--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_11}, doi = {10.1007/3-540-45067-X\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamgardJ03, author = {Ivan Damg{\aa}rd and Mads Jurik}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Length-Flexible Threshold Cryptosystem with Applications}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {350--364}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_30}, doi = {10.1007/3-540-45067-X\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DamgardJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DazaHS03, author = {Vanesa Daza and Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {464--475}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_40}, doi = {10.1007/3-540-45067-X\_40}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DazaHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Gong03, author = {Li Gong}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Is Cross-Platform Security Possible?}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {402}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_34}, doi = {10.1007/3-540-45067-X\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Gong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuPSLNS03, author = {Jabeom Gu and Sehyun Park and Ohyoung Song and Jaeil Lee and Jaehoon Nah and Sung Won Sohn}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Mobile {PKI:} {A} PKI-Based Authentication Framework for the Next Generation Mobile Communications}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {180--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_16}, doi = {10.1007/3-540-45067-X\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuPSLNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanCJPKR03, author = {Dong{-}Guk Han and Nam Su Chang and Seok Won Jung and Young{-}Ho Park and Chang Han Kim and Heuisu Ryu}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {67--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_7}, doi = {10.1007/3-540-45067-X\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HanCJPKR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanHHK03, author = {Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Key Recovery Attacks on {NTRU} without Ciphertext Validation Routine}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {274--284}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_24}, doi = {10.1007/3-540-45067-X\_24}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanHHK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanaokaOMOMOGNI03, author = {Goichiro Hanaoka and Kazuto Ogawa and Itsuro Murota and Go Ohtake and Keigo Majima and Kimiyuki Oyamada and Seiichi Gohshi and Seiichi Namba and Hideki Imai}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Separating Encryption and Key Issuance in Digital Rights Management Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {365--376}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_31}, doi = {10.1007/3-540-45067-X\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanaokaOMOMOGNI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HengK03, author = {Swee{-}Huay Heng and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Square Hash with a Small Key Size}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {522--531}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_45}, doi = {10.1007/3-540-45067-X\_45}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HengK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HitchcockMCD03, author = {Yvonne Hitchcock and Paul Montague and Gary Carter and Ed Dawson}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {The Security of Fixed versus Random Elliptic Curves in Cryptography}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {55--66}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_6}, doi = {10.1007/3-540-45067-X\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HitchcockMCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangKL03, author = {Yong Ho Hwang and Chong Hee Kim and Pil Joong Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {377--386}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_32}, doi = {10.1007/3-540-45067-X\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HwangKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangKLL03, author = {Jung Yeon Hwang and Hyun{-}Jeong Kim and Dong Hoon Lee and Jong In Lim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Digital Signature Schemes with Restriction on Signing Capability}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {324--335}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_28}, doi = {10.1007/3-540-45067-X\_28}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HwangKLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangYL03, author = {Yong Ho Hwang and Dae Hyun Yum and Pil Joong Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {{EPA:} An Efficient Password-Based Protocal for Authenticated Key Exchange}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {452--463}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_39}, doi = {10.1007/3-540-45067-X\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HwangYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IwataYK03, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Pseudorandomness of {KASUMI} Type Permutations}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {130--141}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_12}, doi = {10.1007/3-540-45067-X\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IwataYK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kanso03, author = {Ali Kanso}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Clock-Controlled Shrinking Generator of Feedback Shift Registers}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {443--451}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_38}, doi = {10.1007/3-540-45067-X\_38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kanso03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KawauchiT03, author = {Kei Kawauchi and Mitsuru Tada}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Extract Security of Multi-signature Schemes Based on {RSA}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {336--349}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_29}, doi = {10.1007/3-540-45067-X\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KawauchiT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KhooG03, author = {Khoongming Khoo and Guang Gong}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {New Constructions for Resilient and Highly Nonlinear Boolean Functions}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {498--509}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_43}, doi = {10.1007/3-540-45067-X\_43}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KhooG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimM03, author = {Hwankoo Kim and Sang{-}Jae Moon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {488--497}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_42}, doi = {10.1007/3-540-45067-X\_42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KitazawaSM03, author = {Shigeki Kitazawa and Masakazu Soshi and Atsuko Miyaji}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Evaluation of Anonymity of Practical Anonymous Communication Networks}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {13--26}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_2}, doi = {10.1007/3-540-45067-X\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KitazawaSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kwon03, author = {Taekyoung Kwon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Robust Software Tokens - Yet Another Method for Securing User's Digital Identity}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {476--487}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_41}, doi = {10.1007/3-540-45067-X\_41}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kwon03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsuoK03, author = {Toshihiko Matsuo and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On Parallel Hash Functions Based on Block-Cipher}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {510--521}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_44}, doi = {10.1007/3-540-45067-X\_44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsuoK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NarayananRK03, author = {Arvind Narayanan and C. Pandu Rangan and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Practical Pay {TV} Schemes}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {192--203}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_17}, doi = {10.1007/3-540-45067-X\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Odlyzko03, author = {Andrew M. Odlyzko}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {The Unsolvable Privacy Problem and Its Implications for Security Technologies}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {51--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_5}, doi = {10.1007/3-540-45067-X\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Odlyzko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PashalidisM03, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Taxonomy of Single Sign-On Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {249--264}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_22}, doi = {10.1007/3-540-45067-X\_22}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PashalidisM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengLR03, author = {Tao Peng and Christopher Leckie and Kotagiri Ramamohanarao}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {214--225}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_19}, doi = {10.1007/3-540-45067-X\_19}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengLR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Persiano03, author = {Pino Persiano and Ivan Visconti}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {An Anonymous Credential System and a Privacy-Aware {PKI}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {27--38}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_3}, doi = {10.1007/3-540-45067-X\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Persiano03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PieprzykP03, author = {Josef Pieprzyk and David Pointcheval}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Josef Pieprzyk, David Pointcheval}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {387--401}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_33}, doi = {10.1007/3-540-45067-X\_33}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PieprzykP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReidCHS03, author = {Jason Reid and Ian Cheong and Matthew Henricksen and Jason Smith}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Novel Use of {RBAC} to Protect Privacy in Distributed Health Care Information Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {403--415}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_35}, doi = {10.1007/3-540-45067-X\_35}, timestamp = {Wed, 22 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReidCHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SinghNLS03, author = {Abhishek Singh and Ola Nordstr{\"{o}}m and Chenghuai Lu and Andr{\'{e}} L. M. dos Santos}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Malicious {ICMP} Tunneling: Defense against the Vulnerability}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {226--235}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_20}, doi = {10.1007/3-540-45067-X\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SinghNLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SongK03, author = {Ha Yoon Song and Han{-}gyoo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Cooperative Routers against DoS Attacks}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {204--213}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_18}, doi = {10.1007/3-540-45067-X\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SongK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SungHL03, author = {Jaechul Sung and Deukjo Hong and Sangjin Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Key Recovery Attacks on the RMAC, TMAC, and {IACBC}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {265--273}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_23}, doi = {10.1007/3-540-45067-X\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SungHL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakenakaSK03, author = {Masahiko Takenaka and Takeshi Shimoyama and Takeshi Koshiba}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Theoretical Analysis of chi\({}^{\mbox{2}}\) Attack on {RC6}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {142--153}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_13}, doi = {10.1007/3-540-45067-X\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/TakenakaSK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TanYS03, author = {Chik How Tan and Xun Yi and Chee Kheong Siew}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A {CCA2} Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {428--442}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_37}, doi = {10.1007/3-540-45067-X\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TanYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TinBN03, author = {Yiu Shing Terry Tin and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {166--179}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_15}, doi = {10.1007/3-540-45067-X\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TinBN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangC03, author = {Libin Wang and Kefei Chen}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {A Typed Theory for Access Control and Information Flow Control in Mobile Systems}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {154--165}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_14}, doi = {10.1007/3-540-45067-X\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03, author = {Andr{\'{e}} Weimerskirch and Douglas Stebila and Sheueling Chang Shantz}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {79--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_8}, doi = {10.1007/3-540-45067-X\_8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yen03, author = {Sung{-}Ming Yen}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {106--117}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_10}, doi = {10.1007/3-540-45067-X\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YenMH03, author = {Sung{-}Ming Yen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Permanent Fault Attack on the Parameters of {RSA} with {CRT}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {285--296}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_25}, doi = {10.1007/3-540-45067-X\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YenMH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoungY03, author = {Adam L. Young and Moti Yung}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {297--311}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_26}, doi = {10.1007/3-540-45067-X\_26}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YoungY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {312--323}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_27}, doi = {10.1007/3-540-45067-X\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2003, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X}, doi = {10.1007/3-540-45067-X}, isbn = {3-540-40515-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.