Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008
    URL: https://doi.org/10.1007/978-3-540-70500-0
    DBLP: db/conf/acisp/acisp2008.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 34  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Huafei Zhu.
    Fully-Simulatable Oblivious Set Transfer.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang.
    On the Unprovable Security of 2-Key XCBC.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Subhamoy Maitra, Goutam Paul 0001.
    Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Reza Rezaeian Farashahi.
    Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao.
    Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Isamu Teranishi, Wakaha Ogata.
    Relationship between Two Approaches for Defining the Standard Model PA-ness.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski.
    Distributed Verification of Mixing - Local Forking Proofs Model.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Lei Zhang 0001, Wentao Zhang, Wenling Wu.
    Cryptanalysis of Reduced-Round SMS4 Block Cipher.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Takato Hirano, Koichiro Wada, Keisuke Tanaka.
    Public-Key Cryptosystems with Primitive Power Roots of Unity.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Sebastian Gajek, Mark Manulis, Jörg Schwenk.
    Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Show item 1 to 10 of 34  

    Your query returned 34 matches in the database.