Publications by: Josef Pieprzyk

Also publishes as (J. Pieprzyk)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 12.

Ghodosi, Hossein, Pieprzyk, Josef, and Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Design, Codes and Cryptography, 62 (3). pp. 259-272.

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443), pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586), pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

Ghodosi, Hossein, and Pieprzyk, Josef (2006) An ideal and robust threshold RSA. In: Proceedings of Progress in Cryptology - VIETCRYPT 2006 (4341), pp. 312-321. From: VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, 25-28 September 2006, Hanoi, Vietnam.

Ghodosi, Hossein, and Pieprzyk, Josef (2004) A modification to the authentication of Concast Communication. In: Proceedings of the Conference Cryptographic Algorithms and their Uses. From: Cryptopgraphic Algorithms and their Uses: CAU2004, 5-6 July 2004, Surfers Paradise, QLD, Australia.

Al-Ibrahim, Mohamed, Ghodosi, Hossein, and Pieprzyk, Josef (2002) Authentication of concast communication. Lecture notes in computer science, 2551. pp. 185-198.

Ghodosi, Hossein, and Pieprzyk, Josef (2001) Democratic systems. Lecture notes in computer science, 2119. pp. 392-402.

Ghodosi, Hossein, and Pieprzyk, Josef (2000) Cheating prevention in secret sharing. Lecture notes in computer science, 1841. pp. 328-341.

Ghodosi, H., and Pieprzyk, J. (2000) Cheating Prevention in Secret Sharing. In: Lecture Notes in Computer Science (1841), pp. 328-341. From: 5th Australasian Conference ACISP 2000, 10 - 12 July 2000, Brisbane, Qld.

Ghodosi, Hossein, and Pieprzyk, Josef (1999) Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. In: Lecture Notes in Computer Science (1587), pp. 129-134. From: 4th Australasian Conference on Information Security and Privacy, ACISP’99, 7-9 April 1999, Wollongong, Australia.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1998) Secret sharing in multilevel and compartmented groups. Lecture notes in computer science, 1438. pp. 367-378.

Ghodosi, Hossein, Pieprzyk, Josef, and Safavi-Naini, Rei (1997) Remarks on the multiple assignment secret sharing scheme. Lecture notes in computer science, 1334. pp. 72-80.

This list was generated on Sun Jul 23 10:51:46 2017 AEST.