- Pino Persiano, Ivan Visconti:
An Anonymous Credential System and a Privacy-Aware PKI. ACISP 2003: 27-38 - Josef Pieprzyk, David Pointcheval:
Josef Pieprzyk, David Pointcheval. ACISP 2003: 387-401 - Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith:
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. ACISP 2003: 403-415 - Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos:
Malicious ICMP Tunneling: Defense against the Vulnerability. ACISP 2003: 226-235 - Ha Yoon Song, Han-gyoo Kim:
Cooperative Routers against DoS Attacks. ACISP 2003: 204-213 - Jaechul Sung, Deukjo Hong, Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC. ACISP 2003: 265-273 - Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. ACISP 2003: 142-153 - Chik How Tan, Xun Yi, Chee Kheong Siew:
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. ACISP 2003: 428-442 - Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto:
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179 - Libin Wang, Kefei Chen:
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ACISP 2003: 154-165 - André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC. ACISP 2003: 79-92 - Sung-Ming Yen:
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. ACISP 2003: 106-117 - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:
Permanent Fault Attack on the Parameters of RSA with CRT. ACISP 2003: 285-296 - Adam L. Young, Moti Yung:
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. ACISP 2003: 297-311 - Fangguo Zhang, Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. ACISP 2003: 312-323 - Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Lecture Notes in Computer Science 2727, Springer 2003, ISBN 3-540-40515-1 [contents]