


default search action
9. AISC 2011: Perth, Australia
- Colin Boyd, Josef Pieprzyk:

Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. CRPIT 116, Australian Computer Society 2011, ISBN 978-1-920682-96-5 - Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura:

An Anonymous Authentication Protocol with Single-database PIR. 3-8 - Andrea Agnesse, Marco Pedicini:

Cube Attack in Finite Fields of Higher Order. 9-14 - Md. Golam Kaosar, Russell Paulet, Xun Yi:

Secure Two-Party Association Rule Mining. 15-22 - Malcolm Corney, George M. Mohay, Andrew J. Clark:

Detection of Anomalies from User Profiles Generated from System Logs. 23-32 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:

Identification of Potential Malicious Web Pages. 33-40 - Günther Lackner, Peter Teufl:

IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. 41-50 - Yun Bai, Khaled M. Khan:

A Modal Logic for Information System Security. 51-56 - Scott Campbell, Steve Chan, Jason Lee:

Detection of Fast Flux Service Networks. 57-66 - Ben Palmer, Kris Bubendorfer, Ian Welch:

Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. 67-76 - Thorsten Ries, Radu State, Andriy Panchenko:

Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. 77-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














