ti.\*:("Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)")
Results 1 to 25 of 37
Selection :
Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)Batten, Lynn Margaret; Safavi-Naini, Reihanah.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-35458-1, 1Vol, XII-446 p, isbn 3-540-35458-1Conference Proceedings
A novel range testKUN PENG; BOYD, Colin; DAWSON, Ed et al.Lecture notes in computer science. 2006, pp 247-258, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Statistical decoding revisitedOVERBECK, R.Lecture notes in computer science. 2006, pp 283-294, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Augmented certificate revocation listsLAKSHMINARAYANAN, A; LIM, T. L.Lecture notes in computer science. 2006, pp 87-98, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Improved cryptanalysis of MAGSIMPSON, Leonie; HENRICKSEN, Matt.Lecture notes in computer science. 2006, pp 64-75, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Towards an invisible honeypot monitoring systemQUYNH, Nguyen Anh; TAKEFUJI, Yoshiyasu.Lecture notes in computer science. 2006, pp 111-122, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Algebraic attacks on clock-controlled stream ciphersAL-HINAI, Sultan; BATTEN, Lynn; COLBERT, Bernard et al.Lecture notes in computer science. 2006, pp 1-16, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 16 p.Conference Paper
Graphical representation of authorization policies for weighted credentialsAGUDO, Isaac; LOPEZ, Javier; MONTENEGRO, Jose A et al.Lecture notes in computer science. 2006, pp 383-394, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Secure cross-realm C2C-PAKE protocolYIN YIN; LI BAO.Lecture notes in computer science. 2006, pp 395-406, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Distinguishing attack on SOBER-128 with linear maskingJOO YEON CHO; PIEPRZYK, Josef.Lecture notes in computer science. 2006, pp 29-39, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper
Efficient primitives from exponentiation in ZpSHAOQUAN JIANG.Lecture notes in computer science. 2006, pp 259-270, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Oblivious scalar-product protocolsHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 313-323, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper
Towards provable security for ubiquitous applicationsBURMESTER, Mike; VAN LE, Tri; DE MEDEIROS, Breno et al.Lecture notes in computer science. 2006, pp 295-312, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 18 p.Conference Paper
Cache based power analysis attacks on AESFOURNIER, Jacques; TUNSTALL, Michael.Lecture notes in computer science. 2006, pp 17-28, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Fingercasting : Joint fingerprinting and decryption of broadcast messagesADELSBACH, André; HUBER, Ulrich; SADEGHI, Ahmad-Reza et al.Lecture notes in computer science. 2006, pp 136-147, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Hiding circuit topology from unbounded reverse engineersYU YU; LEIWO, Jussipekka; PREMKUMAR, Benjamin et al.Lecture notes in computer science. 2006, pp 171-182, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Side channel attacks against HMACs based on block-cipher based hash functionsOKEYA, Katsuyuki.Lecture notes in computer science. 2006, pp 432-443, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Efficient and provably secure multi-receiver identity-based signcryptionSHANSHAN DUAN; ZHENFU CAO.Lecture notes in computer science. 2006, pp 195-206, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Key replacement attack against a generic construction of certificateless signatureHU, Bessie C; WONG, Duncan S; ZHENFENG ZHANG et al.Lecture notes in computer science. 2006, pp 235-246, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Online/offline signatures and multisignatures for AODV and DSR routing securitySHIDI XU; YI MU; SUSILO, Willy et al.Lecture notes in computer science. 2006, pp 99-110, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Adaptively secure traitor tracing against key exposure and its application to anywhere TV serviceOGAWA, Kazuto; HANAOKA, Goichiro; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 123-135, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 13 p.Conference Paper
Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacksBRAEKEN, An; LANO, Joseph; PRENEEL, Bart et al.Lecture notes in computer science. 2006, pp 40-51, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Event-oriented k-times revocable-iff-linked group signaturesMAN HO AU; SUSILO, Willy; YIU, Siu-Ming et al.Lecture notes in computer science. 2006, pp 223-234, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Forgery and key recovery attacks on PMAC and mitchell's TMAC variantLEE, Changhoon; KIM, Jongsung; SUNG, Jaechul et al.Lecture notes in computer science. 2006, pp 421-431, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper
Generic transforms to acquire CCA-security for identity based encryption : The cases of FOPKC and REACTKITAGAWA, Takashi; PENG YANG; HANAOKA, Goichiro et al.Lecture notes in computer science. 2006, pp 348-359, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper