Sciweavers

ACISP
1999
Springer
13 years 9 months ago
Evolution of Fair Non-repudiation with TTP
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transac...
Jianying Zhou, Robert H. Deng, Feng Bao
ACISP
1999
Springer
13 years 9 months ago
On the Symmetric Property of Homogeneous Boolean Functions
We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s cl...
Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
ACISP
1999
Springer
13 years 9 months ago
Changing Thresholds in the Absence of Secure Channels
The ways the threshold parameter can be modified after the setup of a secret sharing scheme is the main theme of this work. The considerations are limited to the case when there ...
Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-N...
ACISP
1999
Springer
13 years 9 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...
ACISP
1999
Springer
13 years 9 months ago
Companion Viruses and the Macintosh: Threats and Countermeasures
Jeffrey Horton, Jennifer Seberry
ACISP
1999
Springer
13 years 9 months ago
Generalised Cycling Attacks on RSA and Strong RSA Primes
Marc Gysin, Jennifer Seberry