7. ACISP 2002:
Melbourne,
Victoria,
Austrialia
Lynn Margaret Batten, Jennifer Seberry (Eds.):
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings.
Lecture Notes in Computer Science 2384 Springer 2002, ISBN 3-540-43861-0 BibTeX
@proceedings{DBLP:conf/acisp/2002,
editor = {Lynn Margaret Batten and
Jennifer Seberry},
title = {Information Security and Privacy, 7th Australian Conference,
ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
booktitle = {ACISP},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2384},
year = {2002},
isbn = {3-540-43861-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Key Handling
- Ingrid Biehl, Tsuyoshi Takagi:
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.
1-16
Electronic Edition (Springer LINK) BibTeX
- Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Improvement of the Global Key Recovery System.
17-24
Electronic Edition (Springer LINK) BibTeX
- Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson:
The LILI-II Keystream Generator.
25-39
Electronic Edition (Springer LINK) BibTeX
- Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
A Secure Re-keying Scheme with Key Recovery Property.
40-55
Electronic Edition (Springer LINK) BibTeX
Trust and Secret Sharing
- Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto:
Modelling Trust Structures for Public Key Infrastructures.
56-70
Electronic Edition (Springer LINK) BibTeX
- Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment.
71-88
Electronic Edition (Springer LINK) BibTeX
- Brian King:
Requirements for Group Independent Linear Threshold Secret Sharing Schemes.
89-106
Electronic Edition (Springer LINK) BibTeX
- Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu:
Efficient Sharing of Encrypted Data.
107-120
Electronic Edition (Springer LINK) BibTeX
- Josef Pieprzyk, Xian-Mo Zhang:
Cheating Prevention in Linear Secret Sharing.
121-135
Electronic Edition (Springer LINK) BibTeX
Fast Computation
Cryptanalysis I
Elliptic Curves
AES
Security Management
Authentication
Invited Talk
Oblivious Transfer
Cryptanalysis II
Dealing with Adversaries
- Biljana Cubaleska, Weidong Qiu, Markus Schneider:
How to Play Sherlock Holmes in the World of Mobile Agents.
449-463
Electronic Edition (Springer LINK) BibTeX
- Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang:
A Practical Approach Defeating Blackmailing.
464-481
Electronic Edition (Springer LINK) BibTeX
- Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung:
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.
482-496
Electronic Edition (Springer LINK) BibTeX
- M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan:
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
497-512
Electronic Edition (Springer LINK) BibTeX
Copyright © Sat May 16 22:55:47 2009
by Michael Ley (ley@uni-trier.de)