Abstract is missing.
- Boolean Function Design Using Hill Climbing MethodsWilliam Millan, Andrew Clark, Ed Dawson. 1-11 [doi]
- Enumeration of Correlation Immune Boolean FunctionsSubhamoy Maitra, Palash Sarkar. 12-25 [doi]
- On the Symmetric Property of Homogeneous Boolean FunctionsChengxin Qu, Jennifer Seberry, Josef Pieprzyk. 26-35 [doi]
- Publicly Verifiable Key Escrow with Limited Time SpanKapali Viswanathan, Colin Boyd, Ed Dawson. 36-50 [doi]
- Accelerating Key Establishment Protocols for Mobile CommunicationSeungWon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun Cho. 51-63 [doi]
- Conference Key Agreement from Secret SharingChih-Hung Li, Josef Pieprzyk. 64-76 [doi]
- On ::::m::::-Permutation Protection Scheme Against Modification AttackWai W. Fung, James W. Gray III. 77-87 [doi]
- Inversion Attack and BranchingJovan Dj. Golic, Andrew Clark, Ed Dawson. 88-102 [doi]
- Fail-Stop Threshold Signature Schemes Based on Elliptic CurvesWilly Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk. 103-116 [doi]
- Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group SignatureKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. 117-128 [doi]
- Repudiation of Cheating and Non-repudiation of Zhang s Proxy Signature SchemesHossein Ghodosi, Josef Pieprzyk. 129-134 [doi]
- On the Security of an RSA Based Encryption SchemeSiguna Müller. 135-148 [doi]
- Generalised Cycling Attacks on RSA and Strong RSA PrimesMarc Gysin, Jennifer Seberry. 149-163 [doi]
- RSA Acceleration with Field Programmable Gate ArraysAlexander Tiountchik, Elena Trichina. 164-176 [doi]
- Changing Thresholds in the Absence of Secure ChannelsKeith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang. 177-191 [doi]
- A Self-Certified Group-Oriented Cryptosystem Without a CombinerShahrokh Saeednia, Hossein Ghodosi. 192-201 [doi]
- Companion Viruses and the Macintosh: Threats and CountermeasuresJeffrey Horton, Jennifer Seberry. 202-212 [doi]
- An Implementation of a Secure Version of NFS Including RBACPaul Ashley, Bradley Broom, Mark Vandenwauver. 213-227 [doi]
- Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash SystemsJacques Traoré. 228-243 [doi]
- Efficient Electronic Cash Using Batch SignaturesColin Boyd, Ernest Foo, Chris Pavlovski. 244-257 [doi]
- Evolution of Fair Non-repudiation with TTPJianying Zhou, Robert H. Deng, Feng Bao. 258-269 [doi]
- Authorization in Object Oriented DatabasesYun Bai, Vijay Varadharajan. 270-280 [doi]
- An Analysis of Access Control ModelsGregory Saunders, Michael Hitchens, Vijay Varadharajan. 281-293 [doi]
- Efficient Identity Based Parameter Selection for Elliptic Curve CryptosystemsArjen K. Lenstra. 294-302 [doi]
- Characterization of Optimal Authentication Codes with ArbitrationDingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini. 303-313 [doi]
- A Functional Cryptosystem Using a Group ActionAkihiro Yamamura. 314-325 [doi]