Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acisp/acisp2007.bht:"
@inproceedings{DBLP:conf/acisp/Al-HinaiDHS07, author = {Sultan Al{-}Hinai and Ed Dawson and Matthew Henricksen and Leonie Ruth Simpson}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On the Security of the {LILI} Family of Stream Ciphers Against Algebraic Attacks}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {11--28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_2}, doi = {10.1007/978-3-540-73458-1\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/Al-HinaiDHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Araki07, author = {Toshinori Araki}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient (\emph{k}, \emph{n}) Threshold Secret Sharing Schemes Secure Against Cheating from \emph{n}-1 Cheaters}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {133--142}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_11}, doi = {10.1007/978-3-540-73458-1\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Araki07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ArakiO07, author = {Toshinori Araki and Satoshi Obana}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Flaws in Some Secret Sharing Schemes Against Cheating}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {122--132}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_10}, doi = {10.1007/978-3-540-73458-1\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ArakiO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AuSM07, author = {Man Ho Au and Willy Susilo and Yi Mu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Practical Compact E-Cash}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {431--445}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_31}, doi = {10.1007/978-3-540-73458-1\_31}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AuSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AumassonFMV07, author = {Jean{-}Philippe Aumasson and Matthieu Finiasz and Willi Meier and Serge Vaudenay}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {\emph{TCH}\emph{o}: {A} Hardware-Oriented Trapdoor Cipher}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {184--199}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_15}, doi = {10.1007/978-3-540-73458-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AumassonFMV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BabbageCPR07, author = {Steve Babbage and Carlos Cid and Norbert Pramstaller and H{\aa}vard Raddum}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Analysis of the Hermes8 Stream Ciphers}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {1--10}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_1}, doi = {10.1007/978-3-540-73458-1\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BabbageCPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BhattacharyaMSC07, author = {Debojyoti Bhattacharya and Debdeep Mukhopadhyay and Dhiman Saha and Dipanwita Roy Chowdhury}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Strengthening {NLS} Against Crossword Puzzle Attack}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {29--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_3}, doi = {10.1007/978-3-540-73458-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRP07, author = {Olivier Billet and Matthew J. B. Robshaw and Thomas Peyrin}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On Building Hash Functions from Multivariate Quadratic Equations}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {82--95}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_7}, doi = {10.1007/978-3-540-73458-1\_7}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BirkettDNS07, author = {James Birkett and Alexander W. Dent and Gregory Neven and Jacob C. N. Schuldt}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {274--292}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_21}, doi = {10.1007/978-3-540-73458-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BirkettDNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrandsDD07, author = {Stefan Brands and Liesje Demuynck and Bart De Decker}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {400--415}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_29}, doi = {10.1007/978-3-540-73458-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrandsDD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Malika Izabach{\`{e}}ne and David Pointcheval and Qiang Tang and S{\'{e}}bastien Zimmer}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {96--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_8}, doi = {10.1007/978-3-540-73458-1\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChangYSHL07, author = {Donghoon Chang and Moti Yung and Jaechul Sung and Seokhie Hong and Sangjin Lee}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Preimage Attack on the Parallel FFT-Hashing Function}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {59--67}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_5}, doi = {10.1007/978-3-540-73458-1\_5}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {323--337}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_24}, doi = {10.1007/978-3-540-73458-1\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DahmenOS07, author = {Erik Dahmen and Katsuyuki Okeya and Daniel Schepers}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {245--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_19}, doi = {10.1007/978-3-540-73458-1\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DahmenOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DamgardGK07, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient and Secure Comparison for On-Line Auctions}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {416--430}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_30}, doi = {10.1007/978-3-540-73458-1\_30}, timestamp = {Fri, 02 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DamgardGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GolicB07, author = {Jovan Dj. Golic and Madalina Baltatu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Soft Generation of Secure Biometric Keys}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {107--121}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_9}, doi = {10.1007/978-3-540-73458-1\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GolicB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HayashiT07, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Anonymity on Paillier's Trap-Door Permutation}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {200--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_16}, doi = {10.1007/978-3-540-73458-1\_16}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HayashiT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangMSWW07, author = {Xinyi Huang and Yi Mu and Willy Susilo and Duncan S. Wong and Wei Wu}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Certificateless Signature Revisited}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {308--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_23}, doi = {10.1007/978-3-540-73458-1\_23}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangW07, author = {Qiong Huang and Duncan S. Wong}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Generic Certificateless Key Encapsulation Mechanism}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {215--229}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_17}, doi = {10.1007/978-3-540-73458-1\_17}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshiharaAHS07, author = {Takeru Ishihara and Hiroshi Aono and Sadayuki Hongo and Junji Shikata}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold {KEM}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {259--273}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_20}, doi = {10.1007/978-3-540-73458-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshiharaAHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JeongLSHL07, author = {Kitae Jeong and Changhoon Lee and Jaechul Sung and Seokhie Hong and Jongin Lim}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {143--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_12}, doi = {10.1007/978-3-540-73458-1\_12}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/JeongLSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07, author = {Fen Liu and Wen Ji and Lei Hu and Jintai Ding and Shuwang Lv and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Analysis of the {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {158--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_13}, doi = {10.1007/978-3-540-73458-1\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanigrahiKSM07, author = {Suvasini Panigrahi and Amlan Kundu and Shamik Sural and Arun K. Majumdar}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {446--460}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_32}, doi = {10.1007/978-3-540-73458-1\_32}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanigrahiKSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PasiniV07, author = {Sylvain Pasini and Serge Vaudenay}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Hash-and-Sign with Weak Hashing Made Secure}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {338--354}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_25}, doi = {10.1007/978-3-540-73458-1\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PasiniV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PramstallerLR07, author = {Norbert Pramstaller and Mario Lamberger and Vincent Rijmen}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Second Preimages for Iterated Hash Functions and Their Implications on MACs}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {68--81}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_6}, doi = {10.1007/978-3-540-73458-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PramstallerLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ReyhanitabarWS07, author = {Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi{-}Naini}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {385--399}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_28}, doi = {10.1007/978-3-540-73458-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ReyhanitabarWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SrinathanRC07, author = {Kannan Srinathan and Prasad Raghavendra and C. Pandu Rangan}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On Proactive Perfectly Secure Message Transmission}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {461--473}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_33}, doi = {10.1007/978-3-540-73458-1\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SrinathanRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TartaryW07, author = {Christophe Tartary and Huaxiong Wang}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Combining Prediction Hashing and {MDS} Codes for Efficient Multicast Stream Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {293--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_22}, doi = {10.1007/978-3-540-73458-1\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TartaryW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WuBD07, author = {Yongdong Wu and Feng Bao and Robert H. Deng}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {171--183}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_14}, doi = {10.1007/978-3-540-73458-1\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WuBD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07, author = {Jun Yajima and Yu Sasaki and Yusuke Naito and Terutoshi Iwasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A New Strategy for Finding a Differential Path of {SHA-1}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {45--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_4}, doi = {10.1007/978-3-540-73458-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamamuraKN07, author = {Akihiro Yamamura and Takashi Kurokawa and Junji Nakazato}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Threshold Anonymous Group Identification and Zero-Knowledge Proof}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {370--384}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_27}, doi = {10.1007/978-3-540-73458-1\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamamuraKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yasuda07, author = {Kan Yasuda}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {355--369}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_26}, doi = {10.1007/978-3-540-73458-1\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yasuda07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YoshinoOV07, author = {Masayuki Yoshino and Katsuyuki Okeya and Camille Vuillaume}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Double-Size Bipartite Modular Multiplication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {230--244}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_18}, doi = {10.1007/978-3-540-73458-1\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YoshinoOV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2007, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1}, doi = {10.1007/978-3-540-73458-1}, isbn = {978-3-540-73457-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.