ACISP

AcronymDefinition
ACISPAustralasian Conference on Information Security and Privacy
ACISPAustralian Conference on Information Security and Privacy
ACISPAll-Cargo International Security Procedure (US FAA)
References in periodicals archive ?
Chen, "Anonymous identity-based broadcast encryption with revocation for file sharing," in ACISP 2016, LNCS 9723, pp.
The Eighth Australasian Conference on Information Security and Privacy (ACISP '03).
[25] and presented as an invited talk at ACISP 2017 conference.
In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, volume 4586 of LNCS, p.
Chen, "Building secure tame-like multivariate public-key cryptosystems: the new TTS," in Proceedings of the Australasian Conference on Information Security and Privacy (ACISP 2005), pp.
Wu, "Certificateless signature revisited," in Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP '07), pp.
Schuldt, "Efficient identity-based signatures secure in the standard model," in Proceedings of the ACISP 2006, vol.
Povey, "PKI seeks a trusting relationship," in Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000.
McAven, "Cancelable key-based fingerprint templates," in Proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, pp.