default search action
13. ACISP 2008: Wollongong, Australia
- Yi Mu, Willy Susilo, Jennifer Seberry:
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings. Lecture Notes in Computer Science 5107, Springer 2008, ISBN 978-3-540-69971-2 - Xavier Boyen:
New Paradigms for Password Security. 1-5 - Sebastian Gajek, Mark Manulis, Jörg Schwenk:
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. 6-20 - Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa:
Secure Biometric Authentication with Improved Accuracy. 21-36 - Jiayuan Sui, Douglas R. Stinson:
A Critical Analysis and Improvement of AACS Drive-Host Authentication. 37-52 - Alfred Menezes, Berkant Ustaoglu:
Comparing the Pre- and Post-specified Peer Models for Key Agreement. 53-68 - Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-Round Key Exchange in the Standard Model. 69-83 - Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA. 84-97 - Takato Hirano, Koichiro Wada, Keisuke Tanaka:
Public-Key Cryptosystems with Primitive Power Roots of Unity. 98-112 - Isamu Teranishi, Wakaha Ogata:
Relationship between Two Approaches for Defining the Standard Model PA-ness. 113-127 - Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model. 128-140 - Huafei Zhu:
Fully-Simulatable Oblivious Set Transfer. 141-154 - Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets. 155-169 - Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan:
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary. 170-186 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. 187-202 - Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Linear Cryptanalysis of Reduced Round Serpent. 203-215 - Lei Zhang, Wentao Zhang, Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher. 216-229 - Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Unprovable Security of 2-Key XCBC. 230-238 - Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin:
Looking Back at a New Hash Function. 239-253 - Somitra Kumar Sanadhya, Palash Sarkar:
Non-linear Reduced Round Attacks against SHA-2 Hash Family. 254-266 - Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE. 267-281 - Yu Sasaki, Kazumaro Aoki:
Preimage Attacks on Step-Reduced MD5. 282-296 - Risto M. Hakala, Kaisa Nyberg:
Linear Distinguishing Attack on Shannon. 297-305 - Subhamoy Maitra, Goutam Paul:
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. 306-320 - Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong:
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. 321-335 - V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar:
Signature Generation and Detection of Malware Families. 336-349 - Sunghyun Kim, Heejo Lee:
Reducing Payload Scans for Attack Signature Matching Using Rule Classification. 350-360 - Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao:
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. 361-375 - Pankaj Kohli, Bezawada Bruhadeshwar:
FormatShield: A Binary Rewriting Defense against Format String Attacks. 376-390 - Min Li, Hua Wang, Ashley W. Plank, Jianming Yong:
Advanced Permission-Role Relationship in Role-Based Access Control. 391-403 - B. John Oommen, Ebaa Fayyoumi:
Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases. 404-418 - Silvana Medos, Serdar Boztas:
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k). 419-432 - Christophe Doche, Laurent Habsieger:
A Tree-Based Approach for Computing Double-Base Chains. 433-446 - Reza Rezaeian Farashahi:
Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves. 447-462 - Christophe Nègre, Thomas Plantard:
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation. 463-477
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.