Sciweavers

7 search results - page 1 / 2
» acisp 1999
Sort
View
ACISP
1999
Springer
13 years 10 months ago
Generalised Cycling Attacks on RSA and Strong RSA Primes
Marc Gysin, Jennifer Seberry
ACISP
1999
Springer
13 years 10 months ago
Companion Viruses and the Macintosh: Threats and Countermeasures
Jeffrey Horton, Jennifer Seberry
ACISP
1999
Springer
13 years 10 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...
ACISP
1999
Springer
13 years 10 months ago
Changing Thresholds in the Absence of Secure Channels
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there ...
Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-N...