{"title":"Encryption and the Gloval Information Infrastructure: An Australian Perspective","authors":"Steve Orlowski","doi":"10.1007/BFb0032346","DOIUrl":"https://doi.org/10.1007/BFb0032346","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?","authors":"W. Caelli","doi":"10.1007/BFb0032343","DOIUrl":"https://doi.org/10.1007/BFb0032343","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and Security Policy Choices in an NII Environment","authors":"W. Ware","doi":"10.1007/BFb0032344","DOIUrl":"https://doi.org/10.1007/BFb0032344","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomness Measures Related to Subset Occurrence","authors":"Helen Gustafson, E. Dawson, J. Golic","doi":"10.1007/BFb0032353","DOIUrl":"https://doi.org/10.1007/BFb0032353","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commercial Key Escrow: An Australian Perspective","authors":"W. Caelli","doi":"10.1007/BFb0032345","DOIUrl":"https://doi.org/10.1007/BFb0032345","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Architecture for Trusted Third Party Services","authors":"N. Jefferies, C. Mitchell, M. Walker","doi":"10.1007/BFb0032349","DOIUrl":"https://doi.org/10.1007/BFb0032349","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Fuchsberger, D. Gollmann, P. Lothian, K. Paterson, Abraham Sidiropoulos
{"title":"Public-key Cryptography on Smart Cards","authors":"Andreas Fuchsberger, D. Gollmann, P. Lothian, K. Paterson, Abraham Sidiropoulos","doi":"10.1007/BFb0032364","DOIUrl":"https://doi.org/10.1007/BFb0032364","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Mohay, Hasmukh Morarji, Q. L. Viet, L. Munday, W. Caelli
{"title":"The CASS Shell","authors":"G. Mohay, Hasmukh Morarji, Q. L. Viet, L. Munday, W. Caelli","doi":"10.1007/BFb0032369","DOIUrl":"https://doi.org/10.1007/BFb0032369","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Saving Dollars Makes Sense of Crypto Export Controls","authors":"M. Ames","doi":"10.1007/BFb0032348","DOIUrl":"https://doi.org/10.1007/BFb0032348","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132214164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Order Approximation of Cipher Functions","authors":"W. Millan","doi":"10.1007/BFb0032354","DOIUrl":"https://doi.org/10.1007/BFb0032354","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}