ICICS C

27 papers

YearTitle / Authors
1999An Extended Logic for Analyzing Timed-Release Public-Key Protocols.
Michiharu Kudo, Anish Mathuria
1999Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards.
Constantinos Markantonakis
1999Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project.
Montse Rubia, Juan Carlos Cruellas, Manuel Medina
1999Cryptanalysis of some AES Candidate Algorithms.
Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing
1999Delegation Chains Secure up to Constant Length.
Masayuki Abe, Tatsuaki Okamoto
1999Detachable Electronic Coins.
Chris Pavlovski, Colin Boyd, Ernest Foo
1999Efficient Accumulators without Trapdoor Extended Abstracts.
Tomas Sander
1999Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery.
Fabrice Boudot, Jacques Traoré
1999Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack.
Shoichi Hirose, Kanta Matsuura
1999Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
William Millan, L. Burnett, Gary Carter, Andrew J. Clark, Ed Dawson
1999Extending ERLANG for Safe Mobile Code Execution.
Lawrie Brown, Dan Sahlin
1999Incremental Authentication of Tree-Structured Documents.
Patrik Ekdahl, Ben J. M. Smeets
1999Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings
Vijay Varadharajan, Yi Mu
1999International Cryptography (Abstract).
Doug McGowan
1999Issues in the Design of a Language for Role Based Access Control.
Michael Hitchens, Vijay Varadharajan
1999Linear Secret Sharing with Divisible Shares.
Josef Pieprzyk
1999On the Channel Capacity of Narrow-Band Subliminal Channels.
Kazukuni Kobara, Hideki Imai
1999On the Cryptographic Value of The q
Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann
1999On the Linear Complexity of the Naor-Reingold Pseudo-Random Function.
Frances Griffin, Igor E. Shparlinski
1999Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
1999Plateaued Functions.
Yuliang Zheng, Xian-Mo Zhang
1999Protecting Critical Information Systems (Abstract).
Sushil Jajodia
1999Reaction Attacks against several Public-Key Cryptosystems.
Chris Hall, Ian Goldberg, Bruce Schneier
1999Send Message into a Definite Future.
Wenbo Mao
1999Signature Scheme for Controlled Environments.
Kapali Viswanathan, Colin Boyd, Ed Dawson
1999User Identification System Based on Biometrics for Keystroke.
Kazumasa Omote, Eiji Okamoto
1999Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan