6. ACISP 2001:
Syndey,
NSW,
Australia
Vijay Varadharajan, Yi Mu (Eds.):
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings.
Lecture Notes in Computer Science 2119 Springer 2001, ISBN 3-540-42300-1 BibTeX
@proceedings{DBLP:conf/acisp/2001,
editor = {Vijay Varadharajan and
Yi Mu},
title = {Information Security and Privacy, 6th Australasian Conference,
ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings},
booktitle = {ACISP},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2119},
year = {2001},
isbn = {3-540-42300-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Yacov Yacobi:
A Few Thoughts on E-Commerce.
1-2
Electronic Edition (Springer LINK) BibTeX
- Karl Brincat, Chris J. Mitchell:
New CBC-MAC Forgery Attacks.
3-14
Electronic Edition (Springer LINK) BibTeX
- Amr M. Youssef, Guang Gong:
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.
15-20
Electronic Edition (Springer LINK) BibTeX
- Erik Zenner, Matthias Krause, Stefan Lucks:
Improved Cryptanalysis of the Self-Shrinking Generator.
21-35
Electronic Edition (Springer LINK) BibTeX
- Chris Pavlovski, Colin Boyd:
Attacks Based on Small Factors in Various Group Structures.
36-50
Electronic Edition (Springer LINK) BibTeX
- Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo:
On Classifying Conference Key Distribution Protocols.
51-59
Electronic Edition (Springer LINK) BibTeX
- Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyun-Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
60-73
Electronic Edition (Springer LINK) BibTeX
- Hwankoo Kim, Sang-Jae Moon:
New Public-Key Cryptosystem Using Divisor Class Groups.
74-83
Electronic Edition (Springer LINK) BibTeX
- Andreas Meyer, Stefan Neis, Thomas Pfahler:
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields.
84-103
Electronic Edition (Springer LINK) BibTeX
- Sung-Ming Yen:
Practical Key Recovery Schemes.
104-114
Electronic Edition (Springer LINK) BibTeX
- David May, Henk L. Muller, Nigel P. Smart:
Non-deterministic Processors.
115-129
Electronic Edition (Springer LINK) BibTeX
- Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves:
Personal Secure Booting.
130-144
Electronic Edition (Springer LINK) BibTeX
- Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe:
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules.
145-158
Electronic Edition (Springer LINK) BibTeX
- Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan:
A Strategy for MLS Workflow.
159-175
Electronic Edition (Springer LINK) BibTeX
- B. Clifford Neuman:
Condition-Driven Integration of Security Services.
176
Electronic Edition (Springer LINK) BibTeX
- Eun-Sun Cho, Sunho Hong, Sechang Oh, Hong-Jin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park:
SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes.
177-189
Electronic Edition (Springer LINK) BibTeX
- Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu:
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
190-205
Electronic Edition (Springer LINK) BibTeX
- Akihiro Yamamura, Taiichi Saito:
Private Information Retrieval Based on the Subgroup Membership Problem.
206-220
Electronic Edition (Springer LINK) BibTeX
- Kazumasa Omote, Atsuko Miyaji:
A Practical English Auction with One-Time Registration.
221-234
Electronic Edition (Springer LINK) BibTeX
- Shoichi Hirose, Susumu Yoshida:
A User Authentication Scheme with Identity and Location Privacy.
235-246
Electronic Edition (Springer LINK) BibTeX
- Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee:
An End-to-End Authentication Protocol in Wireless Application Protocol.
247-259
Electronic Edition (Springer LINK) BibTeX
- Akihiro Yamamura, Hirokazu Ishizuka:
Error Detection and Authentication in Quantum Key Distribution.
260-273
Electronic Edition (Springer LINK) BibTeX
- Chuchang Liu, Maris A. Ozols, Anthony Cant:
An Axiomatic Basis for Reasoning about Trust in PKIs.
274-291
Electronic Edition (Springer LINK) BibTeX
- Along Lin:
A Knowledge-Based Approach to Internet Authorizations.
292-304
Electronic Edition (Springer LINK) BibTeX
- John Yesberg, Marie Henderson:
Applications of Trusted Review to Information Security.
305-319
Electronic Edition (Springer LINK) BibTeX
- Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee:
Network Security Modeling and Cyber Attack Simulation Methodology.
320-333
Electronic Edition (Springer LINK) BibTeX
- DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.
334-343
Electronic Edition (Springer LINK) BibTeX
- Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber:
Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.
344-359
Electronic Edition (Springer LINK) BibTeX
- Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson:
Improving the Availability of Time-Stamping Services.
360-375
Electronic Edition (Springer LINK) BibTeX
- Brian King:
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group.
376-391
Electronic Edition (Springer LINK) BibTeX
- Hossein Ghodosi, Josef Pieprzyk:
Democratic Systems.
392-402
Electronic Edition (Springer LINK) BibTeX
- Ayako Maeda, Atsuko Miyaji, Mitsuru Tada:
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme.
403-416
Electronic Edition (Springer LINK) BibTeX
- Douglas R. Stinson, Reto Strobl:
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates.
417-434
Electronic Edition (Springer LINK) BibTeX
- Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes.
435-444
Electronic Edition (Springer LINK) BibTeX
- Chik How Tan, Xun Yi, Chee Kheong Siew:
Signature Schemes Based on 3rd Order Shift Registers.
445-459
Electronic Edition (Springer LINK) BibTeX
- Toru Nakanishi, Yuji Sugiyama:
Anonymous Statistical Survey of Attributes.
460-473
Electronic Edition (Springer LINK) BibTeX
- Byoungcheon Lee, Heesun Kim, Kwangjo Kim:
Secure Mobile Agent Using Strong Non-designated Proxy Signature.
474
Electronic Edition (Springer LINK) BibTeX
- Colin Boyd, Paul Montague, Khanh Quoc Nguyen:
Elliptic Curve Based Password Authenticated Key Exchange Protocols.
487-501
Electronic Edition (Springer LINK) BibTeX
- André Weimerskirch, Christof Paar, Sheueling Chang Shantz:
Elliptic Curve Cryptography on a Palm OS Device.
502-513
Electronic Edition (Springer LINK) BibTeX
- Kyungah Shim:
Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
514-520
Electronic Edition (Springer LINK) BibTeX
Copyright © Sat May 16 22:55:47 2009
by Michael Ley (ley@uni-trier.de)