This book constitutes the refereed proceedings of the 8th Australasian Conference on Information ...
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbo...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australias...
Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlat...
The third International Workshop on Information Security was held at the U- versity of Wollongong...
New Paradigms for Password Security.- Enforcing User-Aware Browser-Based Mutual Authentication wi...
Proceedings of AUSCRYPT '90, the first IACR-sponsored conference on cryptology to be held in Aust...
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space...
This reference work looks at modern concepts of computer security. It introduces the basic mathem...
This book contains the proceedings of AUSCRYPT '92, aninternationalconference on cryptolo...
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information...
Orthogonal designs have proved fundamental to constructing code division multiple antenna systems...