Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012
    URL: https://doi.org/10.1007/978-3-642-31448-3
    DBLP: db/conf/acisp/acisp2012.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 35  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen.
    Revocable Identity-Based Encryption from Lattices.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui.
    Fully Leakage-Resilient Signatures with Auxiliary Inputs.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Xuhua Zhou, Xuhua Ding, Kefei Chen.
    A Generic Construction of Accountable Decryption and Its Applications.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe.
    On the Optimality of Lattices for the Coppersmith Technique.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Jiazhe Chen, Leibo Li.
    Low Data Complexity Attack on Reduced Camellia-256.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar.
    Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Jun Shao.
    Anonymous ID-Based Proxy Re-Encryption.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy.
    Effort-Release Public-Key Encryption from Cryptographic Puzzles.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Peter Lory, Manuel Liedel.
    Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Kaleb Lee, Colin Boyd, Juan Manuel González Nieto.
    Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Show item 1 to 10 of 35  

    Your query returned 35 matches in the database.