8. ACISP 2003:
Wollongong,
Australia
Reihaneh Safavi-Naini, Jennifer Seberry (Eds.):
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings.
Lecture Notes in Computer Science 2727 Springer 2003, ISBN 3-540-40515-1 BibTeX
@proceedings{DBLP:conf/acisp/2003,
editor = {Reihaneh Safavi-Naini and
Jennifer Seberry},
title = {Information Security and Privacy, 8th Australasian Conference,
ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
booktitle = {ACISP},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2727},
year = {2003},
isbn = {3-540-40515-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Privacy and Anonymity
Invited Talk (I)
Elliptic Curves
- Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography.
55-66
Electronic Edition (link) BibTeX
- Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu:
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains.
67-78
Electronic Edition (link) BibTeX
- André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC.
79-92
Electronic Edition (link) BibTeX
- Seigo Arita:
An Addition Algorithm in Jacobian of C34 Curve.
93-105
Electronic Edition (link) BibTeX
Cryptanalysis (I)
Mobile and Network Security
- Libin Wang, Kefei Chen:
A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
154-165
Electronic Edition (link) BibTeX
- Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto:
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.
166-179
Electronic Edition (link) BibTeX
- Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn:
Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications.
180-191
Electronic Edition (link) BibTeX
- Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim:
Practical Pay TV Schemes.
192-203
Electronic Edition (link) BibTeX
- Ha Yoon Song, Han-gyoo Kim:
Cooperative Routers against DoS Attacks.
204-213
Electronic Edition (link) BibTeX
- Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs.
214-225
Electronic Edition (link) BibTeX
- Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos:
Malicious ICMP Tunneling: Defense against the Vulnerability.
226-235
Electronic Edition (link) BibTeX
- Sébastien Canard, Jacques Traoré:
On Fair E-cash Systems Based on Group Signature Schemes.
237-248
Electronic Edition (link) BibTeX
Invited Talk (II)
Cryptanalysis (II)
- Jaechul Sung, Deukjo Hong, Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC.
265-273
Electronic Edition (link) BibTeX
- Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine.
274-284
Electronic Edition (link) BibTeX
- Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:
Permanent Fault Attack on the Parameters of RSA with CRT.
285-296
Electronic Edition (link) BibTeX
- Adam Young, Moti Yung:
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts.
297-311
Electronic Edition (link) BibTeX
Signature
Cryptosystems (I)
- Ivan Damgård, Mads Jurik:
A Length-Flexible Threshold Cryptosystem with Applications.
350-364
Electronic Edition (link) BibTeX
- Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems.
365-376
Electronic Edition (link) BibTeX
- Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee:
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
377-386
Electronic Edition (link) BibTeX
- Josef Pieprzyk, David Pointcheval:
Josef Pieprzyk, David Pointcheval.
387-401
Electronic Edition (link) BibTeX
Invited Talk (III)
Cryptosystems (II)
Key Management
Theory and Hash Functions
Copyright © Sat May 16 22:55:47 2009
by Michael Ley (ley@uni-trier.de)