


default search action
5. ACISP 2000: Brisbane, Queensland, Australia
- Ed Dawson

, Andrew J. Clark, Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1841, Springer 2000, ISBN 3-540-67742-9
Network Security 1
- Adrian Spalka, Armin B. Cremers, Hartmut Lehmler:

Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. 1-17 - Richard Au, Mark Looi, Paul Ashley

:
Towards a New Authorisation Paradigm for Extranets. 18-29 - Lawrie Brown:

Custom Safety Policies in Safe Erlang. 30-40
Public Key Cryptography
- Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung:

A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. 41-48 - Joonsang Baek

, Byoungcheon Lee, Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. 49-58 - Yasuyuki Sakai, Kouichi Sakurai:

Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. 59-73
Network Security 2
- Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng

:
High Performance Agile Crypto Modules. 74-88 - Agung Budi Prasetijo

, Paul Ashley
, Mark Looi, Andrew J. Clark, Gary Gaskell:
A Three-Party HTTP Proxy to Support Internet Content Regulation. 89-96
Cryptographic Implementation Issues
- Hongjun Wu

, Feng Bao, Dingfeng Ye, Robert H. Deng
:
Cryptanalysis of the m-Permutation Protection Schemes. 97-111 - Lauren May, Lyta Penna, Andrew J. Clark:

An Implementation of Bitsliced DES on the Pentium MMXTM Processor. 112-122
Electronic Commerce 1
- Panagiotis Sklavos, Angelos P. Varvitsiotis, Despina Polemi:

Securing Large E-Commerce Networks. 123-133 - Ernest Foo

, Colin Boyd:
Passive Entities: A Strategy for Electronic Payment Design. 134-148
Key Recovery
- Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson

:
Key Recovery System for the Commercial Environment. 149-162 - Masayuki Abe, Masayuki Kanda:

A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. 163-177
Public Key Infrastructure
- Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo

, Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller. 178-190 - Audun Jøsang

, Ingar Glenn Pedersen, Dean Povey:
PKI Seeks a Trusting Relationship. 191-205 - Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant:

The PKI Specification Dilemma: A Formal Solution. 206-219
Boolean Functions
- Jovan Dj. Golic:

Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. 220-233 - Niels Ferguson, Bruce Schneier, David A. Wagner:

Security Weaknesses in a Randomized Stream Cipher. 234-241 - John A. Clark, Jeremy Jacob:

Two-Stage Optimisation in the Design of Boolean Functions. 242-254
Intrusion Detection
- Zhu Hui, Daniel T. H. Tan:

A Novel Engine for Various Intrusion Detection Methods. 255-265
Codes
- G. R. Blakley, I. Borosh, Andreas Klappenecker:

Construction and Categories of Codes. 266-277
Digital Signatures 1
- Hongjun Wu

, Feng Bao, Dingfeng Ye, Robert H. Deng
:
Cryptanalysis of Polynominal Authentication and Signature Scheme. 278-288 - Panayiotis Kotzanikolaou

, Mike Burmester, Vassilios Chrissikopoulos:
Secure Transactions with Mobile Agents in Hostile Environments. 289-297 - Shirow Mitomi, Atsuko Miyaji

:
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. 298-312
Secret Sharing 1
- Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto:

Light Weight Broadcast Exclusion Using Secret Sharing. 313-327 - Hossein Ghodosi, Josef Pieprzyk

:
Cheating Prevention in Secret Sharing. 328-341 - Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao:

On Multiplicative Secret Sharing Schemes. 342-351
Digital Signatures 2
- Hiroshi Doi, Masahiro Mambo, Eiji Okamoto:

On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. 352-367 - Yi Mu, Vijay Varadharajan:

Fail-Stop Confirmer Signatures. 368-377 - William D. Banks

, Daniel Lieman, Igor E. Shparlinski
:
An Extremely Small and Efficient Identification Scheme. 378-384
Protocols
- Kouichi Sakurai, Shingo Miyazaki:

An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. 385-399 - Kook-Heui Lee, Sang-Jae Moon:

AKA Protocols for Mobile Communications. 400-411
Electronic Commerce 2
- Kapali Viswanathan, Colin Boyd, Ed Dawson

:
A Three Phased Schema for Sealed Bid Auction System Design. 412-426 - Khanh Quoc Nguyen, Jacques Traoré:

An Online Public Auction Protocol Protecting Bidder Privacy. 427-442
Secret Sharing 2
- Brian King:

Algorithms to Speed Up Computations in Threshold RSA. 443-456 - Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel:

Sharing Block Ciphers. 457-470
Keynote Papers
- Bob Blakley, G. R. Blakley:

All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. 471-476 - Alan Underwood:

Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society. 477-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














