default search action
11. AISC 2013: Adelaide, Australia
- Clark D. Thomborson, Udaya Parampalli:
Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. CRPIT 138, Australian Computer Society 2013, ISBN 978-1-921770-23-4 - Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. 3-12 - Maryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh:
Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. 13-25 - Russell Paulet, Xun Yi:
Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. 25-30 - Duncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin P. Turnbull, Troy Tobin, Christopher Moir:
An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. 31-38 - Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay:
Digital Camcorder Forensics. 39-48 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Anatomy of Drive-by Download Attack. 49-58 - Hadi Mohammadzadeh, Masood Mansoori, Ian Welch:
Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. 59-66 - Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova:
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. 67-76 - Tansu Alpcan:
A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). 77-78
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.