Skip to main content
placeholder image

The Analysis of Zheng-Seberry Scheme

Conference Paper


Download full-text (Open Access)

Abstract


UOW Authors


  •   Soldera, David (external author)
  •   Seberry, Jennifer
  •   Qu, Chengxin (external author)

Publication Date


  • 2002

Citation


  • Soldera, D., Seberry, J. R. & Qu, C. (2002). The Analysis of Zheng-Seberry Scheme. Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 2002 Proceedings (pp. 159-168). Berlin, Heidelberg: Springer-Verlag.

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1305&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/307

Start Page


  • 159

End Page


  • 168

Place Of Publication


  • Berlin, Heidelberg

Abstract


UOW Authors


  •   Soldera, David (external author)
  •   Seberry, Jennifer
  •   Qu, Chengxin (external author)

Publication Date


  • 2002

Citation


  • Soldera, D., Seberry, J. R. & Qu, C. (2002). The Analysis of Zheng-Seberry Scheme. Information Security and Privacy: 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 2002 Proceedings (pp. 159-168). Berlin, Heidelberg: Springer-Verlag.

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1305&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/307

Start Page


  • 159

End Page


  • 168

Place Of Publication


  • Berlin, Heidelberg