


default search action
11. AISC 2013: Adelaide, Australia
- Clark D. Thomborson, Udaya Parampalli:

Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. CRPIT 138, Australian Computer Society 2013, ISBN 978-1-921770-23-4 - Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:

Slid Pairs in the Initialisation of the A5/1 Stream Cipher. 3-12 - Maryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh:

Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. 13-25 - Russell Paulet, Xun Yi:

Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. 25-30 - Duncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin P. Turnbull, Troy Tobin, Christopher Moir:

An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. 31-38 - Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay:

Digital Camcorder Forensics. 39-48 - Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:

Anatomy of Drive-by Download Attack. 49-58 - Hadi Mohammadzadeh, Masood Mansoori, Ian Welch:

Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. 59-66 - Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova:

Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. 67-76 - Tansu Alpcan:

A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). 77-78

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














