default search action
3. ACISP 1998: Brisbane, Queensland, Australia
- Colin Boyd, Ed Dawson:
Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings. Lecture Notes in Computer Science 1438, Springer 1998, ISBN 3-540-64732-5
Invited Speakers
- Per Kaijser:
A Review of the SESAME Development. 1-8 - Siguna Müller, Winfried B. Müller:
The Security of Public Key Cryptosystems Based on Integer Factorization. 9-23
Network Security I
- Paul Ashley, Mark Vandenwauver, Bradley Broom:
A Uniform Approach to Securing Unix Applications Using SESAME. 24-35 - Rainer Falk, Markus Trommer:
Integrated Management of Network and Host Based Security Mechanisms. 36-47 - Jeffrey Horton, Jennifer Seberry:
Covert Distributed Computing Using Java Through Web Spoofing. 48-57
Block Ciphers
- Xun Yi, Kwok-Yan Lam, Yongfei Han:
Differential Cryptanalysis of a Block Cipher. 58-67 - Hung-Min Sun, Shiuh-Pyng Shieh:
On Private-Key Cryptosystems Based on Product Codes. 68-79 - Gary Carter, Ed Dawson, Lauren Nielsen:
Key Schedules of Iterative Block Ciphers. 80-89
Network Security II
- Uri Blumenthal, Nguyen C. Hien, J. H. Rooney:
Low-Cost Secure Server Connection with Limited-Privilege Clients. 90-98 - Qi He, Katia P. Sycara, Zhongmin Su:
A Solution to Open Standard of PKI. 99-110 - Elke Franz, A. Graubner, Anja Jerichow, Andreas Pfitzmann:
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. 111-122
Stream Ciphers
- Jovan Dj. Golic, Renato Menicocci:
Correlation Attacks on Up/Down Cascades. 123-134 - Gregory G. Rose:
A Stream Cipher Based on Linear Feedback over GF(28). 135-146 - Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator. 147-158
Authorization Codes and Boolean Functions
- Reihaneh Safavi-Naini, Yejing Wang:
Bounds and Constructions for A3-code with Multi-senders. 159-168 - Josef Pieprzyk, Cheng Xin Qu:
Rotation-Symmetric Functions and Fast Hashing. 169-180 - William Millan:
How to Improve the Nonlinearity of Bijective S-Boxes. 181-192
Software Security and Electronic Commerce
- Rauli Kaksonen, Petri Mähönen:
Object Modeling of Cryptographic Algorithms with UML. 193-204 - Martin Manninger, Robert Schischka:
Adapting an Electronic Purse for Internet Payments. 205-214 - Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol. 215-226
Public Key Cryptography
- Marie Henderson:
Applications of Linearised and Sub-linearised Polynomials to Information Security. 227-237 - Mark Chen, Eric Hughes:
Protocol Failures Related to Order of Encryption and Signature. 238-249
Hardware
- Wai W. Fung, James W. Gray III:
Protection Against EEPROM Modification Attacks. 250-260 - Jaroslav Hruby:
Trends in Quantum Cryptography in Czech Republic. 261-272
Access Control
- Yun Bai, Vijay Varadharajan:
A High Level Language for Conventional Access Control Models. 273-283 - Tuomas Aura:
Fast Access Control Decisions from Delegation Certificate Databases. 284-295 - Thomas Riechmann, Jürgen Kleinöder:
Meta Objects for Access Control: Role-Based Principals. 296-307 - Jonathon Tidswell, John Potter:
A Dynamically Typed Access Control Model. 308-319
Protocols
- Shahrokh Saeednia, Reihaneh Safavi-Naini:
Efficient Identity-Based Conference Key Distribution Protocols. 320-331 - Carsten Rudolph:
A Formal Model for Systematic Design of Key Establishment Protocols. 332-343 - Colin Boyd, Anish Mathuria:
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. 344-355 - Tage Stabell-Kulø, Arne Helme, Gianluca Dini:
Detecting Key-Dependencies. 356-366
Secret Sharing
- Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini:
Secret Sharing in Multilevel and Compartmented Groups. 367-378 - Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes. 379-390 - Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa:
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. 391-402
Digital Signatures
- Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo:
A User Identification System Using Signature Written with Mouse. 403-414 - Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes. 415-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.