|
| | | |
Volume 116 - Ninth Australasian Information Security Conference(AISC 2011), Perth, Australia, January 2011This volume contains papers presented at the Ninth Australasian Information Security Conference (AISC 2011), Perth, Australia, January 2011. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 45.5% (10 from 22). |
Volume Citation
Papers Included in the VolumeNakamura, T., Inenaga, S., Baba, K., Ikeda, D. and Yasuura, H. (2011). An Anonymous Authentication Protocol with Single-database PIR. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 3-8. |
| Agnesse, A. and Pedicini, M. (2011). Cube Attack in Finite Fields of Higher Order. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 9-14. |
| Kaosar, M. G., Paulet, R. and Yi, X. (2011). Secure Two-Party Association Rule Mining. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 15-22. |
| Corney, M., Mohay, G. and Clark, A. (2011). Detection of Anomalies from User Profiles Generated from System Logs. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 23-32. |
| Le, V. L., Welch, I., Gao, X. and Komisarczuk, P. (2011). Identification of Potential Malicious Web Pages. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 33-40. |
| Lackner, G. and Teufl, P. (2011). IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 41-50. |
| Bai, Y. and Khan, K. (2011). A Modal Logic for Information System Security. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 51-56. |
| Campbell, S., Chan, S. and Lee, J. (2011). Detection of Fast Flux Service Networks. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 57-66. |
| Palmer, B., Bubendorfer, K. and Welch, I. (2011). Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 67-76. |
| Ries, T., State, R. and Panchenko, A. (2011). Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 77-86. |
|
Papers listed: 10
|