@inproceedings{CRPITV125P3-14,
Author = { Lee, P.H., Parampalli, U., Narayan, S. },
Title = { E cient Identity-based Signcryption without Random Oracles },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 3-14 },
URL  = { http://crpit.com/confpapers/CRPITV125Lee.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P15-26,
Author = { Suppakitpaisarn, V., Edahiro, M. and Imai, H. },
Title = { Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J. and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 15-26 },
URL  = { http://crpit.com/confpapers/CRPITV125Suppakitpaisarn.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P27-32,
Author = { Alhamdan, A., Bartlett, H., Simpson, L., Dawson E. and Wong, K. K. },
Title = { State convergence in the initialisation of the Sfinks stream cipher },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 27-32 },
URL  = { http://crpit.com/confpapers/CRPITV125Alhamdan.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P33-38,
Author = { Orumiehchiha, M.A., Pieprzyk, J, and Steinfeld, R. },
Title = { Cryptanalysis of RC4-Based Hash Function },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 33-38 },
URL  = { http://crpit.com/confpapers/CRPITV125Orumiehchiha.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P39-46,
Author = { Radke, K., Boyd, C., Nieto, J.G. and Brereton, M. },
Title = { Towards a Secure Human-and-Computer Mutual Authentication Protocol },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 39-46 },
URL  = { http://crpit.com/confpapers/CRPITV125Radke.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P47-58,
Author = { Seifi, Y., Suriadi, S., Foo, E. and Boyd, C. },
Title = { Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 47-58 },
URL  = { http://crpit.com/confpapers/CRPITV125Seifi.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P59-70,
Author = { Mills, C., Fidge, C. J. and Corney, D. },
Title = { Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 59-70 },
URL  = { http://crpit.com/confpapers/CRPITV125Mills.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P71-82,
Author = { Doble, C., Fidge, C. J. and Corney, D. },
Title = { Data Flow Analysis of Embedded Program Expressions },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 71-82 },
URL  = { http://crpit.com/confpapers/CRPITV125Doble.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P83-90,
Author = { Hauser, C., Tronel, F., Reid, J. and Fidge, C. },
Title = { A taint marking approach to confidentiality violation detection },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 83-90 },
URL  = { http://crpit.com/confpapers/CRPITV125Hauser.pdf },
Year = { 2012 }
}


@inproceedings{CRPITV125P91-100,
Author = { Lee , K., Nieto, J. M. G. and Boyd, C. },
Title = { Improving the Efficiency of RFID Authentication with Pre-Computation },
BookTitle = { Australasian Information Security Conference (AISC 2012) },
Editor = { Pieprzyk, J.and Thomborson, C. },
Series= {CRPIT},
Address= { Melbourne, Australia },
Publisher = {ACS},
Volume = { 125 },
Pages = { 91-100 },
URL  = { http://crpit.com/confpapers/CRPITV125Lee .pdf },
Year = { 2012 }
}