default search action
10. AISC 2012: Melbourne, Australia
- Josef Pieprzyk, Clark D. Thomborson:
Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012. CRPIT 125, Australian Computer Society 2012, ISBN 978-1-921770-06-7 - Peter Hyun-Jeen Lee, Udaya Parampalli, Shivaramakrishnan Narayan:
E cient Identity-based Signcryption without Random Oracles. 3-14 - Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai:
Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers. 15-26 - Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
State convergence in the initialisation of the Sfinks stream cipher. 27-32 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Cryptanalysis of RC4-Based Hash Function. 33-38 - Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Towards a Secure Human-and-Computer Mutual Authentication Protocol. 39-46 - Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. 47-58 - Chris Mills, Colin J. Fidge, Diane Corney:
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. 59-70 - Christopher Doble, Colin J. Fidge, Diane Corney:
Data Flow Analysis of Embedded Program Expressions. 71-82 - Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. 83-90 - Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
Improving the Efficiency of RFID Authentication with Pre-Computation. 91-100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.