咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 14 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 理学
    • 12 篇 物理学
    • 4 篇 数学
    • 1 篇 统计学(可授理学、...
  • 12 篇 工学
    • 10 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 2 篇 光学工程
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 quantum theory
  • 3 篇 quantum optics
  • 3 篇 cryptography
  • 2 篇 quantum computin...
  • 2 篇 operating system...
  • 2 篇 computers and so...
  • 2 篇 computer communi...
  • 2 篇 digital watermar...
  • 2 篇 management of co...
  • 2 篇 cryptology
  • 2 篇 algorithm analys...
  • 2 篇 lakes
  • 1 篇 program debuggin...
  • 1 篇 conferences
  • 1 篇 photodetectors
  • 1 篇 quantum noise
  • 1 篇 registers
  • 1 篇 database systems
  • 1 篇 mobile devices
  • 1 篇 quantum entangle...

机构

  • 6 篇 department of ph...
  • 4 篇 centre for advan...
  • 3 篇 centre for advan...
  • 2 篇 department of co...
  • 2 篇 centre for advan...
  • 2 篇 department of ph...
  • 2 篇 department of ph...
  • 1 篇 department of ph...
  • 1 篇 quantum entangle...
  • 1 篇 department of ph...
  • 1 篇 department of ph...
  • 1 篇 university of lu...
  • 1 篇 dept. of physics...
  • 1 篇 departmnent of p...
  • 1 篇 fujian normal un...
  • 1 篇 quantum entangle...
  • 1 篇 oregon center fo...
  • 1 篇 centre for advan...
  • 1 篇 centre for advan...
  • 1 篇 school of inform...

作者

  • 14 篇 pieprzyk josef
  • 9 篇 barry c. sanders
  • 5 篇 gupta gaurav
  • 4 篇 dominic w. berry
  • 4 篇 stephen d. bartl...
  • 4 篇 wang huaxiong
  • 3 篇 josef pieprzyk
  • 3 篇 huaxiong wang
  • 2 篇 matusiewicz krys...
  • 2 篇 zhang xian-mo
  • 2 篇 sanders
  • 2 篇 sanders b.c.
  • 1 篇 mang feng
  • 1 篇 berry d.w.
  • 1 篇 berry
  • 1 篇 t.c. ralph
  • 1 篇 m.g. raymer
  • 1 篇 gaurav gupta
  • 1 篇 zhang xiam-mo
  • 1 篇 nikolic ivica

语言

  • 34 篇 英文
检索条件"机构=Centre for Advanced Computing Algorithms and Cryptography"
34 条 记 录,以下是1-10 订阅
排序:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks  20
Does Counting Still Count? Revisiting the Security of Counti...
收藏 引用
20th Annual Network and Distributed System Security Symposium, NDSS 2013
作者: Asghar, Hassan Jameel Steinfeld, Ron Li, Shujun Pieprzyk, Josef Centre for Advanced Computing Algorithms and Cryptography Department of Computing Faculty of Science Macquarie University Sydney Australia Clayton School of Information Technology Faculty of Information Technology Monash University Clayton Australia Department of Computing Faculty of Engineering and Physical Sciences University of Surrey Guildford Surrey United Kingdom
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret...
来源: 评论
Socio-technological phishing prevention
收藏 引用
Information Security Technical Report 2011年 第2期16卷 67-73页
作者: Gupta, Gaurav Pieprzyk, Josef Centre for Advanced Computing - Algorithms and Cryptography Department of Computing Macquarie University Australia
Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors, and network aut... 详细信息
来源: 评论
Bucket attack on numeric set watermarking model and safeguards
收藏 引用
Information Security Technical Report 2011年 第2期16卷 59-66页
作者: Gupta, Gaurav Pieprzyk, Josef Hamey, Len Centre for Advanced Computing - Algorithms and Cryptography Department of Computing Macquarie University Australia Department of Computing Macquarie University Australia
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numer... 详细信息
来源: 评论
Cryptanalysis of the LAKE hash family
Cryptanalysis of the LAKE hash family
收藏 引用
16th International Workshop on Fast Software Encryption, FSE 2009
作者: Biryukov, Alex Gauravaram, Praveen Guo, Jian Khovratovich, Dmitry Ling, San Matusiewicz, Krystian Nikolic, Ivica Pieprzyk, Josef Wang, Huaxiong University of Luxembourg Luxembourg School of Physical and Mathematical Sciences Nanyang Technological University Singapore Singapore Department of Mathematics Technical University of Denmark Denmark Centre for Advanced Computing - Algorithms and Cryptography Macquarie University Australia
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different c... 详细信息
来源: 评论
Reversible and blind database watermarking using difference expansion  1
Reversible and blind database watermarking using difference ...
收藏 引用
1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, e-Forensics 2008
作者: Gupta, Gaurav Pieprzyk, Josef Centre for Advanced Computing - Algorithms and Cryptography Department of Computing Macquarie University SydneyNSW2109 Australia
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the waterm... 详细信息
来源: 评论
Source Code Watermarking Based on Function Dependency Oriented Sequencing
Source Code Watermarking Based on Function Dependency Orient...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Gaurav Gupta Josef Pieprzyk Centre for Advanced Computing-Algorithms and Cryptography Department of Computing Macquarie University NSW Australia
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-... 详细信息
来源: 评论
Quantum optical adaptive phase estimation of sidebands
Quantum optical adaptive phase estimation of sidebands
收藏 引用
Conference on Lasers and Electro-Optics (CLEO)
作者: T.A. Wheatley E.H. Huntington D.W. Berry H.M. Wiseman T.C. Ralph School of Information Technology and Electrical Engineering University College University of New South Wales Canberra ACT Australia Department of Physics and Centre for Advanced Computing Algorithms and Cryptography Macquarie University Sydney Australia School of Science Griffith University Nathan QLD Australia Department of Physics University of Queensland Brisbane QLD Australia
We present experimental results of the use of continuous adaptive feedback in quantum optical measurement of phase of the sidebands on continuous-wave (cw) coherent light, consistent with theoretical predictions (Berr... 详细信息
来源: 评论
Quantum optical adaptive phase estimation of sidebands
Optics InfoBase Conference Papers
收藏 引用
Optics InfoBase Conference Papers 2008年
作者: Wheatley, T.A. Huntington, E.H. Berry, D.W. Wiseman, H.M. Ralph, T.C. School of Information Technology and Electrical Engineering University College The University of New South Wales Canberra 2600 ACT Australia Department of Physics Centre for Advanced Computing Algorithms and Cryptography Macquarie University Sydney 2109 NSW Australia School of Science Griffith University Nathan 4111 QLD Australia Department of Physics University of Queensland Brisbane 4072 QLD Australia
We present experimental results of the use of continuous adaptive feedback in quantum optical measurement of phase of the sidebands on continuous-wave (cw) coherent light, consistent with theoretical predictions [1]. ... 详细信息
来源: 评论
Software watermarking Resilient to debugging attacks
收藏 引用
Journal of Multimedia 2007年 第2期2卷 10-16页
作者: Gupta, Gaurav Pieprzyk, Josef Centre for Advanced Computing - Algorithms and Cryptography Department of Computing Division of Information and Communication Sciences Macquarie University Sydney NSW - 2109 Australia
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jum... 详细信息
来源: 评论
An attack-localizing watermarking scheme for natural language documents  06
An attack-localizing watermarking scheme for natural languag...
收藏 引用
2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
作者: Gupta, Gaurav Pieprzyk, Josef Wang, Hua Xiong Centre for Advanced Computing - Algorithms and Cryptography Department of Computing Macquarie University Sydney NSW 2109 Australia
We present a text watermarking scheme that embeds a bit-stream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph... 详细信息
来源: 评论