default search action
6. AISC 2008: Wollongong, NSW, Australia
- Ljiljana Brankovic, Mirka Miller:
Sixth Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, January 2008. CRPIT 81, Australian Computer Society 2008, ISBN 978-1-920682-62-0 - Pino Caballero-Gil:
Current Topics in Security of Mobile Ad-hoc NETworks. AISC 2008: 3 - Eli Biham, Jennifer Seberry:
A New Very Fast Stream Cipher : Tpy. AISC 2008: 5 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Access Control in Distributed Workflow. 9-17 - Alex Murray, Duncan A. Grove:
PULSE: a Pluggable User-space Linux Security Environment paper. 19-25 - Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
Commitment Issues in Delegation Process. 27-38 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
ID-based One-pass Authenticated Key Establishment. 39-46 - Amparo Fúster-Sabater, Pino Caballero-Gil:
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. 47-52 - Audun Jøsang, Bander AlFayyadh:
Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign. 53-58 - Qiong Ren, Yi Mu, Willy Susilo:
Mitigating Phishing with ID-based Online/Offline Authentication. 59-64 - Mohammed Al Zomai, Bander AlFayyadh, Audun Jøsang, Adrian McCullagh:
An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. 65-73 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Formal Security Analysis of Australian E-passport Implementation. 75-82 - Suriadi Suriadi, Ernest Foo, Rong Du:
Layered Identity Infrastructure Model for Identity Meta Systems. 83-92 - Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
Secure Data Aggregation in Wireless Sensor Network: a survey. 93-105 - Volker Fusenig, Dagmara Spiewak, Thomas Engel:
Acimn: A protocol for Anonymous Communication In Multi hop wireless networks. 107-114 - Timo Wiander:
Implementing the ISO/IEC 17799 standard in practice - experiences on audit phases. 115-119
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.