5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings
Lecture Notes in Computer Science > Information Security and Privacy > Cryptographic Implementation Issues > 97-111
Lecture Notes in Computer Science > Information Security and Privacy > Cryptographic Implementation Issues > 112-122
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures I > 278-288
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures I > 289-297
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures I > 298-312
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures II > 352-367
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures II > 368-377
Lecture Notes in Computer Science > Information Security and Privacy > Digital Signatures II > 378-384
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce I > 123-133
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce I > 134-148
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce II > 412-426
Lecture Notes in Computer Science > Information Security and Privacy > Electronic Commerce II > 427-442
Lecture Notes in Computer Science > Information Security and Privacy > Intrusion Detection > 255-265