default search action
7. AISC 2009: Wellington, New Zealand
- Ljiljana Brankovic, Willy Susilo:
Seventh Australasian Information Security Conference, AISC 2009, Wellington, New Zealand, January 2009. CRPIT 98, Australian Computer Society 2009, ISBN 978-1-920682-79-8 - Clark D. Thomborson:
Foundation for Systems Security. AISC 2009: 3 - Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Faster Group Operations on Elliptic Curves. 7-19 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Strong Designated Verifier Signature in a Multi-user Setting. 21-31 - Muhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong:
Algebraic Analysis of LEX. 33-45 - Routo Terada, Eduardo T. Ueda:
A New Version of the RC6 Algorithm, Stronger against χ2 Cryptanalysis. 47-52 - Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel:
Slotted Packet Counting Attacks on Anonymity Protocols. 53-59 - Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, Sasa Radomirovic:
Towards a Decision Model Based on Trust and Security Risk Management. 61-69 - Gilbert Notoatmodjo, Clark D. Thomborson:
Passwords and Perceptions. 71-78 - Yu-Cheng Tu, Clark D. Thomborson:
Preliminary Security Specification for New Zealand's igovt System. 79-88 - Masato Arai, Hidehiko Tanaka:
Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information. 89-98 - Vicky Liu, Luis Franco, William J. Caelli, Lauren May, Tony Sahama:
Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC). 99-108
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.