default search action
12. AISC 2014: Auckland, New Zealand
- Udaya Parampalli, Ian Welch:
Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014. CRPIT 149, Australian Computer Society 2014, ISBN 978-1-921770-32-6 - Masood Mansoori, Ian Welch, Qiang Fu:
YALIH, Yet Another Low Interaction Honeyclient. 7-15 - Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo:
Poisoned GOOSE: Exploiting the GOOSE Protocol. 17-22 - Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong:
Weak key-IV Pairs in the A5/1 Stream Cipher. 23-36 - Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. 37-45 - Janaka Seneviratne, Udaya Parampalli, Lars Kulik:
An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures. 47-56 - Sajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji James Akande, Ernest Foo:
Practical Modbus Flooding Attack and Detection. 57-65 - Kamini Bajaj, Josef Pieprzyk:
A Case Study of User-Level Spam Filtering. 67-75 - Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson:
Algebraic analysis of Trivium-like ciphers (Poster). 77-81 - Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture for Validating DNS Services (Poster). 83-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.