Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13--15, 2004. Proceedings. (Q704810): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Created claim: Wikidata QID (P12): Q56387667, #quickstatements; #temporary_batch_1708296850199
Property / Wikidata QID
 
Property / Wikidata QID: Q56387667 / rank
 
Normal rank

Revision as of 00:10, 19 February 2024

scientific article
Language Label Description Also known as
English
Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13--15, 2004. Proceedings.
scientific article

    Statements

    Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13--15, 2004. Proceedings. (English)
    0 references
    19 January 2005
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1027.00042). Indexed articles: \textit{Jiang, Shaoquan; Gong, Guang}, Multi-service oriented broadcast encryption, 1-11 [Zbl 1098.68585] \textit{Asano, Tomoyuki}, Secure and insecure modifications of the subset difference broadcast encryption scheme, 12-23 [Zbl 1098.68580] \textit{Tô, Vu Dong; Safavi-Naini, Reihaneh}, Linear code implies public-key traitor tracing with revocation, 24-35 [Zbl 1098.94632] \textit{Kim, Chong Hee; Hwang, Yong Ho; Lee, Pil Joong}, TTS without revocation capability secure against CCA2, 36-49 [Zbl 1098.94618] \textit{Chang, Yan-Cheng}, Single database private information retrieval with logarithmic communication, 50-61 [Zbl 1098.68038] \textit{Hanaoka, Goichiro; Imai, Hideki; Mueller-Quade, Joern; Nascimento, Anderson C. A.; Otsuka, Akira; Winter, Andreas}, Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructions, 62-73 [Zbl 1098.94022] \textit{Avoine, Gildas; Vaudenay, Serge}, Optimistic fair exchange based on publicly verifiable secret sharing, 74-85 [Zbl 1098.94611] \textit{Peinado, Marcus; Chen, Yuqun; England, Paul; Manferdelli, John}, NGSCB: A trusted open system, 86-97 [Zbl 1098.94636] \textit{Nakahara, Jorge jun.; Preneel, Bart; Vandewalle, Joos}, The Biryukov-Demirci attack on reduced-round versions of IDEA and MESH ciphers, 98-109 [Zbl 1098.94030] \textit{Shin, Yongsup; Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin}, Differential-linear type attacks on reduced rounds of SHACAL-2, 110-122 [Zbl 1098.94629] \textit{Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin; Hong, Dowon}, The related-key rectangle attack-application to SHACAL-1, 123-136 [Zbl 1098.94619] \textit{Ko, Youngdai; Lee, Changhoon; Hong, Seokhie; Lee, Sangjin}, Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1, 137-148 [Zbl 1098.94620] \textit{Jacobson, Michael J. jun.}, The security of cryptosystems based on class semigroups of imaginary quadratic non-maximal orders, 149-156 [Zbl 1098.94617] \textit{Bao, Feng}, Analysis of a conference scheme under active and passive attacks, 157-163 [Zbl 1098.68582] \textit{Wan, Zhiguo; Wang, Shuhong}, Cryptanalysis of two password-authenticated key exchange protocols, 164-175 [Zbl 1098.94634] \textit{Bao, Feng; Wang, Guilin; Zhou, Jianying; Zhu, Huafei}, Analysis and improvement of Micali's fair contract signing protocol, 176-187 [Zbl 1098.68583] \textit{Vaudenay, Serge}, Digital signature schemes with domain parameters, 188-199 [Zbl 1098.94633] \textit{Yum, Dae Hyun; Lee, Pil Joong}, Generic construction of certificateless signature, 200-211 [Zbl 1098.94635] \textit{Lee, Wonil; Nandi, Mridul; Sarkar, Palash; Chang, Donghoon; Lee, Sangjin; Sakurai, Kouichi}, A generalization of PGV-hash functions and security analysis in black-box model, 212-223 [Zbl 1098.94622] \textit{Iwata, Tetsu; Kurosawa, Kaoru}, How to re-use round function in super-pseudorandom permutation, 224-235 [Zbl 1098.94616] \textit{Kurosawa, Kaoru; Matsuo, Toshihiko}, How to remove MAC from DHIES, 236-247 [Zbl 1098.94621] \textit{Crispo, Bruno; Popescu, Bogdan C.; Tanenbaum, Andrew S.}, Symmetric key authentication services revisited, 248-261 [Zbl 1098.68584] \textit{King, Brian; Rubin, Ben}, Improvements to the point halving algorithm, 262-276 [Zbl 1098.94024] \textit{Yang, Bo-Yin; Chen, Jiun-Ming}, Theoretical analysis of XL over small fields, 277-288 [Zbl 1098.94032] \textit{Lim, Chae Hoon}, A new method for securing elliptic scalar multiplication against side-channel attacks, 289-300 [Zbl 1098.94623] \textit{Yao, Ming; Henricksen, Matt; Maitland, Greg; Foo, Ernest; Dawson, Ed}, A mobile agent system providing offer privacy, 301-312 [Zbl 1098.68927] \textit{Susilo, Willy; Zhang, Fangguo; Mu, Yi}, Identity-based strong designated verifier signature schemes, 313-324 [Zbl 1098.94630] \textit{Liu, Joseph K.; Wei, Victor K.; Wong, Duncan S.}, Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract), 325-335 [Zbl 1098.94624] \textit{Nakanishi, Toru; Sugiyama, Yuji}, A group signature scheme with efficient membership revocation for reasonable groups, 336-347 [Zbl 1098.94627] \textit{Huang, Zhenjie; Wang, Yumin}, Convertible nominative signatures, 348-357 [Zbl 1098.94615] \textit{Tin, Yiu Shing Terry; Vasanta, Harikrishna; Boyd, Colin; Nieto, Juan Manuel González}, Protocols with security proofs for mobile applications, 358-369 [Zbl 1098.94631] \textit{Galbraith, Steven D.; Hopkins, Herbie J.; Shparlinski, Igor E.}, Secure bilinear Diffie-Hellman bits, 370-378 [Zbl 1098.94612] \textit{Min, SungJun; Yamamoto, Go; Kim, Kwangjo}, Weak property of malleability in NTRUSign, 379-390 [Zbl 1098.94626] \textit{Lenstra, Arjen; Voss, Tim}, Information security risk assessment, aggregation, and mitigation, 391-401 [Zbl 1098.68586] \textit{Ruan, Chun; Varadharajan, Vijay}, A weighted graph approach to authorization delegation and conflict resolution, 402-413 [Zbl 1098.94637] \textit{Zhao, Xi-Bin; Lam, Kwok-Yan; Chung, Siu-Leung; Gu, Ming; Sun, Jia-Guang}, Authorization mechanisms for virtual organizations in distributed computing systems, 414-426 [Zbl 1098.94638] \textit{McAven, Luke; Safavi-Naini, Rei; Yung, Moti}, Unconditionally secure encryption under strong attacks, 427-439 [Zbl 1098.94625] \textit{Anderson, Erik; Beaver, Cheryl; Draelos, Timothy; Schroeppel, Richard; Torgerson, Mark}, ManTiCore: Encryption with joint cipher-state authentication, 440-453 [Zbl 1098.94610] \textit{Han, Dong-Guk; Lim, Jongin; Sakurai, Kouichi}, On security of XTR public key cryptosystems against side channel attacks, 454-465 [Zbl 1098.94614] \textit{Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille}, On the exact flexibility of the flexible countermeasure against side channel attacks, 466-477 [Zbl 1098.94628] \textit{Giraud, Christophe; Knudsen, Erik W.}, Fault attacks on signature schemes, 478-491 [Zbl 1098.94613]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references