Sciweavers

7 search results - page 1 / 2
» acisp 1999
Sort
View
ACISP
1999
Springer
13 years 9 months ago
Generalised Cycling Attacks on RSA and Strong RSA Primes
Marc Gysin, Jennifer Seberry
ACISP
1999
Springer
13 years 9 months ago
Companion Viruses and the Macintosh: Threats and Countermeasures
Jeffrey Horton, Jennifer Seberry
ACISP
1999
Springer
13 years 9 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...
ACISP
1999
Springer
13 years 9 months ago
Changing Thresholds in the Absence of Secure Channels
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there ...
Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-N...