default search action
9. AISC 2011: Perth, Australia
- Colin Boyd, Josef Pieprzyk:
Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. CRPIT 116, Australian Computer Society 2011, ISBN 978-1-920682-96-5 - Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura:
An Anonymous Authentication Protocol with Single-database PIR. 3-8 - Andrea Agnesse, Marco Pedicini:
Cube Attack in Finite Fields of Higher Order. 9-14 - Md. Golam Kaosar, Russell Paulet, Xun Yi:
Secure Two-Party Association Rule Mining. 15-22 - Malcolm Corney, George M. Mohay, Andrew J. Clark:
Detection of Anomalies from User Profiles Generated from System Logs. 23-32 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Identification of Potential Malicious Web Pages. 33-40 - Günther Lackner, Peter Teufl:
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. 41-50 - Yun Bai, Khaled M. Khan:
A Modal Logic for Information System Security. 51-56 - Scott Campbell, Steve Chan, Jason Lee:
Detection of Fast Flux Service Networks. 57-66 - Ben Palmer, Kris Bubendorfer, Ian Welch:
Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. 67-76 - Thorsten Ries, Radu State, Andriy Panchenko:
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. 77-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.