default search action
Search dblp for Publications
export results for "toc:db/conf/auisc/auisc2012.bht:"
@inproceedings{DBLP:conf/auisc/Al-HamdanBSDW12, author = {Ali Al{-}Hamdan and Harry Bartlett and Leonie Simpson and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {State convergence in the initialisation of the Sfinks stream cipher}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {27--32}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Alhamdan.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Al-HamdanBSDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/DobleFC12, author = {Christopher Doble and Colin J. Fidge and Diane Corney}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Data Flow Analysis of Embedded Program Expressions}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {71--82}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Doble.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/DobleFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/HauserTRF12, author = {Christophe Hauser and Fr{\'{e}}d{\'{e}}ric Tronel and Jason Reid and Colin J. Fidge}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {A taint marking approach to confidentiality violation detection}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {83--90}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Hauser.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/HauserTRF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeeNB12, author = {Kaleb Lee and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Improving the Efficiency of {RFID} Authentication with Pre-Computation}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {91--100}, publisher = {Australian Computer Society}, year = {2012}, timestamp = {Fri, 01 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/LeeNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeePN12, author = {Peter Hyun{-}Jeen Lee and Udaya Parampalli and Shivaramakrishnan Narayan}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {E cient Identity-based Signcryption without Random Oracles}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {3--14}, publisher = {Australian Computer Society}, year = {2012}, timestamp = {Fri, 01 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/LeePN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MillsFC12, author = {Chris Mills and Colin J. Fidge and Diane Corney}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {59--70}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Mills.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MillsFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/OrumiehchihaPS12, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Cryptanalysis of RC4-Based Hash Function}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {33--38}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Orumiehchiha.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/OrumiehchihaPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNB12, author = {Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Margot Brereton}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Towards a Secure Human-and-Computer Mutual Authentication Protocol}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {39--46}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Radke.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SeifiSFB12, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Analysis of Object-Specific Authorization Protocol {(OSAP)} using Coloured Petri Nets}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {47--58}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Seifi.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SeifiSFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Suppakitpaisarn12, author = {Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {15--26}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Suppakitpaisarn.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Suppakitpaisarn12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2012, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/Vol125.html}, isbn = {978-1-921770-06-7}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.