![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
6. ATIS 2016: Cairns, QLD, Australia
- Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings. Communications in Computer and Information Science 651, 2016, ISBN 978-981-10-2740-6
Attacks on Data Security Systems
- Lynn Margaret Batten, Mohammed Khalil Amain:
A New Sign-Change Attack on the Montgomery Ladders. 3-14 - Md. Iftekhar Salam
, Harry Bartlett
, Ed Dawson
, Josef Pieprzyk
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. 15-26
Detection of Attacks on Data Security Systems
- Xi Zheng
, Lei Pan
, Hongxu Chen, Peiyin Wang:
Investigating Security Vulnerabilities in Modern Vehicle Systems. 29-40 - Hassan Qahur Al Mahri, Leonie Simpson
, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
Tweaking Generic OTR to Avoid Forgery Attacks. 41-53 - Abdullahi Chowdhury
:
Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview. 54-65
Data Security
- Maciej Skórski:
Evaluating Entropy Sources for True Random Number Generators by Collision Counting. 69-80 - James Jin Kang
, Tom H. Luan
, Henry Larkin:
Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing. 81-92 - Srinivasa Rao Subramanya Rao:
An Improved EllipticNet Algorithm for Tate Pairing on Weierstrass' Curves, Faster Point Arithmetic and Pairing on Selmer Curves and a Note on Double Scalar Multiplication. 93-105 - Pinaki Sarkar, Morshed Uddin Chowdhury
:
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi). 106-114
Data Privacy
- Veronika Kuchta, Olivier Markowitch:
Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption. 117-129 - Karin Sumongkayothin, Steven Gordon
, Atsuko Miyaji
, Chunhua Su, Komwut Wipusitwarakun:
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space. 130-141 - Yufeng Lin, Biplob Ray
, Dennis Jarvis, Jia Wang:
False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks. 142-153 - Swathi Parasa, Lynn Margaret Batten:
Mobile Money in the Australasian Region - A Technical Security Perspective. 154-162
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.