1. ACISP 1996: Wollongong, NSW, Australia

Invited Lecture 1

Session 1: Authentication

Session 2: Secret Sharing

Session 3: Encryption and Cryptographic Functions

Invited Lecture 2

Session 4: Authentication Protocols

Session 5: Stream Ciphers

Session 6: Access Control

Invited Lecture 3

Session 7: Security Models and Intrusion Detection

Session 8: Threshold Cryptography

Session 9: Hashing

Session 10: Odds and Ends