Bounds and Constructions for A^3-code with Multi-senders (Englisch)
- Neue Suche nach: Safavi-Naini, R.
- Neue Suche nach: Wang, Y.
- Neue Suche nach: Safavi-Naini, R.
- Neue Suche nach: Wang, Y.
- Neue Suche nach: Dawson, E.
- Neue Suche nach: Boyd, C.
In:
Information, security and privacy
1438
;
159-168
;
1998
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Bounds and Constructions for A^3-code with Multi-senders
-
Beteiligte:
-
Kongress:Australasian conference; 3rd, Information, security and privacy ; 1998 ; Brisbane; Australia
-
Erschienen in:Information, security and privacy , 1438 ; 159-168LECTURE NOTES IN COMPUTER SCIENCE , 1438 ; 159-168
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:New York
-
Erscheinungsdatum:01.01.1998
-
Format / Umfang:10 pages
-
Anmerkungen:Described as proceedings. Also known as ACISP '98
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Review of the SESAME DevelopmentKaijser, P. et al. | 1998
- 9
-
The Security of Public Key Cryptosystems Based on Integer FactorizationMueller, S. / Mueller, W. B. et al. | 1998
- 24
-
A Uniform Approach to Securing Unix Applications Using SESAMEAshley, P. / Vandenwauver, M. / Broom, B. et al. | 1998
- 36
-
Integrated Management of Network and Host Based Security MechanismsFalk, R. / Trommer, M. et al. | 1998
- 48
-
Covert Distributed Computing Using Java Through Web SpoofingHorton, J. / Seberry, J. et al. | 1998
- 58
-
Differential Cryptanalysis of a Block CipherYi, X. / Kwok Yan Lam / Han, Y. et al. | 1998
- 68
-
On Private-Key Cryptosystems Based on Product CodesSun, H.-M. / Shieh, S.-P. et al. | 1998
- 80
-
Key Schedules of Iterative Block CiphersCarter, G. / Dawson, E. / Nielsen, L. et al. | 1998
- 90
-
Low-Cost Secure Server Connection with Limited-Privilege ClientsBlumenthal, U. / Hien, N. C. / Rooney, J. H. et al. | 1998
- 99
-
A Solution to Open Standard of PKIHe, Q. / Sycara, K. / Su, Z. et al. | 1998
- 111
-
Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode AttacksFranz, E. / Graubner, A. / Jerichow, A. / Pfitzmann, A. et al. | 1998
- 123
-
Correlation Attacks on Up/Down CascadesGolic, J. D. / Menicocci, R. et al. | 1998
- 135
-
A Stream Cipher Based on Linear Feedback over GF(2^8)Rose, G. et al. | 1998
- 147
-
A Probabilistic Correlation Attack on the Shrinking GeneratorSimpson, L. / Golic, J. D. / Dawson, E. et al. | 1998
- 159
-
Bounds and Constructions for A^3-code with Multi-sendersSafavi-Naini, R. / Wang, Y. et al. | 1998
- 169
-
Rotation-Symmetric Functions and Fast HashingPieprzyk, J. / Cheng Xin Qu et al. | 1998
- 181
-
How to Improve the Nonlinearity of Bijective S-BoxesMillan, W. et al. | 1998
- 193
-
Object Modeling of Cryptographic Algorithms with UMLKaksonen, R. / Maehoenen, P. et al. | 1998
- 205
-
Adapting an Electronic Purse for Internet PaymentsManninger, M. / Schischka, R. et al. | 1998
- 215
-
LITESET: A Light-Weight Secure Electronic Transaction ProtocolHanaoka, G. / Zheng, Y. / Imai, H. et al. | 1998
- 227
-
Applications of Linearised and Sub-linearised Polynomials to Information SecurityHenderson, M. et al. | 1998
- 238
-
Protocol Failures Related to Order of Encryption and Signature: Computation of Discrete Logarithms in RSA GroupsChen, M. / Hughes, E. et al. | 1998
- 250
-
Protection Against EEPROM Modification AttacksFung, W. W. / Gray, J. W. et al. | 1998
- 261
-
Trends in Quantum Cryptography in Czech RepublicHruby, J. et al. | 1998
- 273
-
A High Level Language for Conventional Access Control ModelsBai, Y. / Varadharajan, V. et al. | 1998
- 284
-
Fast Access Control Decisions from Delegation Certificate DatabasesAura, T. et al. | 1998
- 296
-
Meta Objects for Access Control: Role-Based PrincipalsRiechmann, T. / Kleinoeder, J. et al. | 1998
- 308
-
A Dynamically Typed Access Control ModelTidswell, J. E. / Potter, J. M. et al. | 1998
- 320
-
Efficient Identity-Based Conference Key Distribution ProtocolsSaeednia, S. / Safavi-Naini, R. et al. | 1998
- 332
-
A Formal Model for Systematic Design of Key Establishment ProtocolsRudolph, C. et al. | 1998
- 344
-
Key Establishment Protocols for Secure Mobile Communications: A Selective SurveyBoyd, C. / Mathuria, A. et al. | 1998
- 356
-
Detecting Key-DependenciesStabell-Kuloe, T. / Helme, A. / Dini, G. et al. | 1998
- 367
-
Secret Sharing in Multilevel and Compartmented GroupsGhodosi, H. / Pieprzyk, J. / Yafavi-Naini, R. et al. | 1998
- 379
-
On Construction of Cumulative Secret Sharing SchemesGhodosi, H. / Pieprzyk, J. / Safavi-Naini, R. / Wang, H. et al. | 1998
- 391
-
A Comment on the Efficiency of Secret Sharing Scheme over any Finite Abelian GroupDesmedt, Y. / King, B. / Kishimoto, W. / Kurosawa, K. et al. | 1998
- 403
-
A User Identification System Using Signature Written with MouseSyukri, A. F. / Okamoto, E. / Mambo, M. et al. | 1998
- 415
-
On Zhang's Nonrepudiable Proxy Signature SchemesLee, N.-Y. / Hwang, T. / Wang, C.-H. et al. | 1998