Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ti.\*:("Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 37

  • Page / 2
Export

Selection :

  • and

Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)Batten, Lynn Margaret; Safavi-Naini, Reihanah.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-35458-1, 1Vol, XII-446 p, isbn 3-540-35458-1Conference Proceedings

A novel range testKUN PENG; BOYD, Colin; DAWSON, Ed et al.Lecture notes in computer science. 2006, pp 247-258, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Statistical decoding revisitedOVERBECK, R.Lecture notes in computer science. 2006, pp 283-294, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Augmented certificate revocation listsLAKSHMINARAYANAN, A; LIM, T. L.Lecture notes in computer science. 2006, pp 87-98, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Improved cryptanalysis of MAGSIMPSON, Leonie; HENRICKSEN, Matt.Lecture notes in computer science. 2006, pp 64-75, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Towards an invisible honeypot monitoring systemQUYNH, Nguyen Anh; TAKEFUJI, Yoshiyasu.Lecture notes in computer science. 2006, pp 111-122, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Algebraic attacks on clock-controlled stream ciphersAL-HINAI, Sultan; BATTEN, Lynn; COLBERT, Bernard et al.Lecture notes in computer science. 2006, pp 1-16, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 16 p.Conference Paper

Graphical representation of authorization policies for weighted credentialsAGUDO, Isaac; LOPEZ, Javier; MONTENEGRO, Jose A et al.Lecture notes in computer science. 2006, pp 383-394, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Secure cross-realm C2C-PAKE protocolYIN YIN; LI BAO.Lecture notes in computer science. 2006, pp 395-406, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Distinguishing attack on SOBER-128 with linear maskingJOO YEON CHO; PIEPRZYK, Josef.Lecture notes in computer science. 2006, pp 29-39, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Efficient primitives from exponentiation in ZpSHAOQUAN JIANG.Lecture notes in computer science. 2006, pp 259-270, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Oblivious scalar-product protocolsHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 313-323, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Towards provable security for ubiquitous applicationsBURMESTER, Mike; VAN LE, Tri; DE MEDEIROS, Breno et al.Lecture notes in computer science. 2006, pp 295-312, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 18 p.Conference Paper

Cache based power analysis attacks on AESFOURNIER, Jacques; TUNSTALL, Michael.Lecture notes in computer science. 2006, pp 17-28, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Fingercasting : Joint fingerprinting and decryption of broadcast messagesADELSBACH, André; HUBER, Ulrich; SADEGHI, Ahmad-Reza et al.Lecture notes in computer science. 2006, pp 136-147, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Hiding circuit topology from unbounded reverse engineersYU YU; LEIWO, Jussipekka; PREMKUMAR, Benjamin et al.Lecture notes in computer science. 2006, pp 171-182, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Side channel attacks against HMACs based on block-cipher based hash functionsOKEYA, Katsuyuki.Lecture notes in computer science. 2006, pp 432-443, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Efficient and provably secure multi-receiver identity-based signcryptionSHANSHAN DUAN; ZHENFU CAO.Lecture notes in computer science. 2006, pp 195-206, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Key replacement attack against a generic construction of certificateless signatureHU, Bessie C; WONG, Duncan S; ZHENFENG ZHANG et al.Lecture notes in computer science. 2006, pp 235-246, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Online/offline signatures and multisignatures for AODV and DSR routing securitySHIDI XU; YI MU; SUSILO, Willy et al.Lecture notes in computer science. 2006, pp 99-110, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Adaptively secure traitor tracing against key exposure and its application to anywhere TV serviceOGAWA, Kazuto; HANAOKA, Goichiro; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 123-135, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 13 p.Conference Paper

Evaluating the resistance of stream ciphers with linear feedback against fast algebraic attacksBRAEKEN, An; LANO, Joseph; PRENEEL, Bart et al.Lecture notes in computer science. 2006, pp 40-51, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Event-oriented k-times revocable-iff-linked group signaturesMAN HO AU; SUSILO, Willy; YIU, Siu-Ming et al.Lecture notes in computer science. 2006, pp 223-234, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Forgery and key recovery attacks on PMAC and mitchell's TMAC variantLEE, Changhoon; KIM, Jongsung; SUNG, Jaechul et al.Lecture notes in computer science. 2006, pp 421-431, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Generic transforms to acquire CCA-security for identity based encryption : The cases of FOPKC and REACTKITAGAWA, Takashi; PENG YANG; HANAOKA, Goichiro et al.Lecture notes in computer science. 2006, pp 348-359, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

  • Page / 2