Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009
    URL: https://doi.org/10.1007/978-3-642-02620-1
    DBLP: db/conf/acisp/acisp2009.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 31  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Hongbo Yu, Xiaoyun Wang.
    Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Jiang Wu, Douglas R. Stinson.
    A Highly Scalable RFID Authentication Protocol.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Sebastiaan H. von Solms.
    Is the Information Security King Naked?.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ahto Buldas, Aivo Jürgenson, Margus Niitsoo.
    Efficiency Bounds for Adversary Constructions in Black-Box Reductions.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong.
    On Improving the Accuracy and Performance of Content-Based File Type Identification.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Kenneth G. Paterson, Sriramkrishnan Srinivasan.
    Building Key-Private Public-Key Encryption Schemes.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park.
    Fair Threshold Decryption with Semi-Trusted Third Parties.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka.
    Security on Hybrid Encryption with the Tag-KEM/DEM Framework.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson.
    Jacobi Quartic Curves Revisited.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Douglas Stebila, Berkant Ustaoglu.
    Towards Denial-of-Service-Resilient Key Agreement Protocols.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Show item 1 to 10 of 31  

    Your query returned 31 matches in the database.