Stop the war!
Остановите войну!
for scientists:
default search action
1. ACISP 1996: Wollongong, NSW, Australia
- Josef Pieprzyk, Jennifer Seberry:
Information Security and Privacy, First Australasian Conference, ACISP'96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings. Lecture Notes in Computer Science 1172, Springer 1996, ISBN 3-540-61991-7
Invited Lecture 1
- Steve Orlowski:
The Changing Face of Information Technology Security. 1-13
Session 1: Authentication
- Thomas Hardjono, Jennifer Seberry:
Replicating the Kuperee authentication server for increased security and reliability. 14-26 - R. Taylor:
Non-repudiation without public-key. 27-37 - Yongfei Han:
Investigation of non-repudiation protocols. 38-47
Session 2: Secret Sharing
- Shin-Jia Hwang, Chin-Chen Chang:
A dynamic secret sharing scheme with cheater detection. 48-55 - Ari Renvall, Cunsheng Ding:
A nonlinear secret sharing scheme. 56-66 - Ari Renvall, Cunsheng Ding:
The access structure of some secret-sharing schemes. 67-78
Session 3: Encryption and Cryptographic Functions
- Chuan-Kun Wu, Ed Dawson:
On construction of resilient functions. 79-86 - Ed Dawson, He Jingmin:
Another approach to software key escrow encryption. 87-95 - Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini:
Cryptography based on transcendental numbers. 96-107
Invited Lecture 2
- Eugene F. Troy:
Breakthroughs in Standardization of IT Security Criteria. 108-120
Session 4: Authentication Protocols
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Tailoring authentication protocols to match underlying mechanisms. 121-133 - Yi Mu, Vijay Varadharajan:
On the design of security protocols for mobile communications. 134-145 - Colin Boyd:
A Framework for Design of Key Establishment Protocols. 146-157
Session 5: Stream Ciphers
- Jovan Dj. Golic:
On period of multiplexed sequences. 158-168 - Jovan Dj. Golic:
Edit distance correlation attacks on clock-controlled combiners with memory. 169-181 - Miodrag J. Mihaljevic:
A faster cryptanalysis of the self-shrinking generator. 182-189
Session 6: Access Control
- Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini:
Modeling a multi-level secure object-oriented database using views. 190-206 - Vijay Varadharajan, Phillip Allen:
Support for joint action based security policies. 207-218
Invited Lecture 3
- Ravi S. Sandhu:
Access Control: The Neglected Frontier. 219-227
Session 7: Security Models and Intrusion Detection
- Erland Jonsson, Mikael Andersson:
On the quantitative assessment of behavioural security. 228-241 - Ulf Gustafson, Erland Jonsson, Tomas Olovsson:
On the modelling of preventive security based on a PC network intrusion experiment. 242-252 - Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk:
Evidential reasoning in network intrusion detection systems. 253-265
Session 8: Threshold Cryptography
- Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang:
A group-oriented (t, n) undeniable signature scheme without trusted center. 266-274 - Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini:
Cryptosystems for hierarchical groups. 275-286
Session 9: Hashing
- Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk:
On selectable collisionful hash functions. 287-298 - Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk:
On password-based authenticated key exchange using collisionful hash functions. 299-310
Session 10: Odds and Ends
- Babak Sadeghiyan, Javad Mohajeri:
A new universal test for bit strings. 311-319 - Yi Mu, Yuliang Zheng:
An alternative model of quantum key agreement via photon coupling. 320-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.