Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
This text constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP '99, held in Wollongong, New South Wales, Australia in April 1999. The 26 revised full papers presented were reviewed and selected from a total of 53 submissions. The book is divided into topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends.
This text constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP '99, held in Wollongong, ...
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003.
The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in...