default search action
5. ACISP 2000: Brisbane, Queensland, Australia
- Ed Dawson, Andrew J. Clark, Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1841, Springer 2000, ISBN 3-540-67742-9
Network Security 1
- Adrian Spalka, Armin B. Cremers, Hartmut Lehmler:
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. 1-17 - Richard Au, Mark Looi, Paul Ashley:
Towards a New Authorisation Paradigm for Extranets. 18-29 - Lawrie Brown:
Custom Safety Policies in Safe Erlang. 30-40
Public Key Cryptography
- Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung:
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. 41-48 - Joonsang Baek, Byoungcheon Lee, Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. 49-58 - Yasuyuki Sakai, Kouichi Sakurai:
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. 59-73
Network Security 2
- Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
High Performance Agile Crypto Modules. 74-88 - Agung Budi Prasetijo, Paul Ashley, Mark Looi, Andrew J. Clark, Gary Gaskell:
A Three-Party HTTP Proxy to Support Internet Content Regulation. 89-96
Cryptographic Implementation Issues
- Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of the m-Permutation Protection Schemes. 97-111 - Lauren May, Lyta Penna, Andrew J. Clark:
An Implementation of Bitsliced DES on the Pentium MMXTM Processor. 112-122
Electronic Commerce 1
- Panagiotis Sklavos, Angelos P. Varvitsiotis, Despina Polemi:
Securing Large E-Commerce Networks. 123-133 - Ernest Foo, Colin Boyd:
Passive Entities: A Strategy for Electronic Payment Design. 134-148
Key Recovery
- Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson:
Key Recovery System for the Commercial Environment. 149-162 - Masayuki Abe, Masayuki Kanda:
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. 163-177
Public Key Infrastructure
- Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller. 178-190 - Audun Jøsang, Ingar Glenn Pedersen, Dean Povey:
PKI Seeks a Trusting Relationship. 191-205 - Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant:
The PKI Specification Dilemma: A Formal Solution. 206-219
Boolean Functions
- Jovan Dj. Golic:
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. 220-233 - Niels Ferguson, Bruce Schneier, David A. Wagner:
Security Weaknesses in a Randomized Stream Cipher. 234-241 - John A. Clark, Jeremy Jacob:
Two-Stage Optimisation in the Design of Boolean Functions. 242-254
Intrusion Detection
- Zhu Hui, Daniel T. H. Tan:
A Novel Engine for Various Intrusion Detection Methods. 255-265
Codes
- G. R. Blakley, I. Borosh, Andreas Klappenecker:
Construction and Categories of Codes. 266-277
Digital Signatures 1
- Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of Polynominal Authentication and Signature Scheme. 278-288 - Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos:
Secure Transactions with Mobile Agents in Hostile Environments. 289-297 - Shirow Mitomi, Atsuko Miyaji:
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. 298-312
Secret Sharing 1
- Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto:
Light Weight Broadcast Exclusion Using Secret Sharing. 313-327 - Hossein Ghodosi, Josef Pieprzyk:
Cheating Prevention in Secret Sharing. 328-341 - Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao:
On Multiplicative Secret Sharing Schemes. 342-351
Digital Signatures 2
- Hiroshi Doi, Masahiro Mambo, Eiji Okamoto:
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. 352-367 - Yi Mu, Vijay Varadharajan:
Fail-Stop Confirmer Signatures. 368-377 - William D. Banks, Daniel Lieman, Igor E. Shparlinski:
An Extremely Small and Efficient Identification Scheme. 378-384
Protocols
- Kouichi Sakurai, Shingo Miyazaki:
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. 385-399 - Kook-Heui Lee, Sang-Jae Moon:
AKA Protocols for Mobile Communications. 400-411
Electronic Commerce 2
- Kapali Viswanathan, Colin Boyd, Ed Dawson:
A Three Phased Schema for Sealed Bid Auction System Design. 412-426 - Khanh Quoc Nguyen, Jacques Traoré:
An Online Public Auction Protocol Protecting Bidder Privacy. 427-442
Secret Sharing 2
- Brian King:
Algorithms to Speed Up Computations in Threshold RSA. 443-456 - Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel:
Sharing Block Ciphers. 457-470
Keynote Papers
- Bob Blakley, G. R. Blakley:
All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. 471-476 - Alan Underwood:
Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society. 477-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.