default search action
10. ACISP 2005: Brisbane, Australia
- Colin Boyd, Juan Manuel González Nieto:
Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Lecture Notes in Computer Science 3574, Springer 2005, ISBN 3-540-26547-3
Invited Talk
- Bob Blakley, G. R. Blakley:
All Sail, No Anchor III: Risk Aggregation and Time's Arrow. 1-16
Network Security
- Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam:
Traversing Middleboxes with the Host Identity Protocol. 17-28 - Phillip Pudney, Jill Slay:
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. 29-39 - Vipul Goyal, Rohit Tripathy:
An Efficient Solution to the ARP Cache Poisoning Problem. 40-51
Cryptanalysis
- Scott Contini, Igor E. Shparlinski:
On Stern's Attack Against Secret Truncated Linear Congruential Generators. 52-60 - Atsuko Miyaji, Yuuki Takano:
On the Success Probability of chi2-attack on RC6. 61-74 - Souradyuti Paul, Bart Preneel:
Solving Systems of Differential Equations of Addition. 75-88
Group Communications
- Tomoyuki Asano, Kazuya Kamio:
A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. 89-100 - Ratna Dutta, Rana Barua:
Dynamic Group Key Agreement in Tree-Based Setting. 101-112 - C. K. Wong, Agnes Chan:
Immediate Data Authentication for Multicast in Resource Constrained Network. 113-121
Elliptic Curve Cryptography
- Christophe Doche:
Redundant Trinomials for Finite Fields of Characteristic 2. 122-133 - Soonhak Kwon:
Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. 134-145 - Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi:
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. 146-157
Mobile Security
- Ming Yao, Kun Peng, Ed Dawson:
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. 158-169 - Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd:
An Improved Execution Integrity Solution for Mobile Agents. 170-183 - Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. 184-194
Side Channel Attacks
- Jiqiang Lv, Yongfei Han:
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. 195-206 - Régis Bevan:
Improved Zero Value Attack on XTR. 207-217 - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. 218-229
Evaluation and Biometrics
- Tim McComb, Luke Wildman:
SIFA: A Tool for Evaluation of High-Grade Security Devices. 230-241 - Russell Ang, Reihaneh Safavi-Naini, Luke McAven:
Cancelable Key-Based Fingerprint Templates. 242-252
Public Key Cryptosystems
- Alexander W. Dent:
Hybrid Signcryption Schemes with Insider Security. 253-266 - Arjen K. Lenstra, Benne de Weger:
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. 267-279 - Steven D. Galbraith, Chris Heneghan, James F. McKee:
Tunable Balancing of RSA. 280-292
Access Control I
- Celia Li, Cungang Yang, Richard Cheung:
Key Management for Role Hierarchy in Distributed Systems. 293-302 - Shujing Wang, Yan Zhang:
A Formalization of Distributed Authorization with Delegation. 303-315
Signatures I
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. 316-328 - Willy Susilo, Yi Mu:
On the Security of Nominative Signatures. 329-335
Invited Talk
- Adrian McCullagh, William J. Caelli:
Who Goes There? Internet Banking: A Matter of Risk and Reward. 336-357
Access Control II
- Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Role Activation Management in Role Based Access Control. 358-369 - Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
VO-Sec: An Access Control Framework for Dynamic Virtual Organization. 370-381
Threshold Cryptography
- Brian King:
An Efficient Implementation of a Threshold RSA Signature Scheme. 382-393 - Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague:
GBD Threshold Cryptography with an Application to RSA Key Recovery. 394-405 - Toshiyuki Isshiki, Keisuke Tanaka:
An (n-t)-out-of-n Threshold Ring Signature Scheme. 406-416
Protocols I
- Guomin Yang, Duncan S. Wong, Xiaotie Deng:
Deposit-Case Attack Against Secure Roaming. 417-428 - Kim-Kwang Raymond Choo, Yvonne Hitchcock:
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. 429-442
Group Signatures
- Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki:
Group Signature Schemes with Membership Revocation for Large Groups. 443-454 - Jun Furukawa, Hideki Imai:
An Efficient Group Signature Scheme from Bilinear Maps. 455-467 - Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. 468-480
Protocols II
- Tuomas Aura, Aarthi Nagarajan, Andrei V. Gurtov:
Analysis of the HIP Base Exchange Protocol. 481-493 - Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo:
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. 494-505
Signatures II
- Xingyang Guo, Quan Zhang, Chaojing Tang:
On the Security of Two Key-Updating Signature Schemes. 506-517 - Bo-Yin Yang, Jiun-Ming Chen:
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. 518-531
Invited Talk
- Yvo Desmedt:
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. 532-536
Credentials
- Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Fix of an Anonymous Credential System. 537-547 - Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials. 548-559
Symmetric Cryptography
- Chris J. Mitchell:
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. 560-571 - William Millan:
New Cryptographic Applications of Boolean Function Equivalence Classes. 572-583
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.