This book constitutes the refereed conference proceedings of the 19th Australasian Conference on ...
This book constitutes the refereed proceedings of the 6th International Conference on Network and...
Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature ...
New Paradigms for Password Security.- Enforcing User-Aware Browser-Based Mutual Authentication wi...
This book constitutes the refereed proceedings of the Second Australasian Conference on Informati...
A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Crypto...
ICICS¿99, the Second International Conference on Information and C- munication Security, was held...
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information...
Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Eff...
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol.- An On-L...
This monograph illustrates important notions in security reductions and essential techniques in s...
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology...