Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 116 - Ninth Australasian Information Security Conference

(AISC 2011), Perth, Australia, January 2011

This volume contains papers presented at the Ninth Australasian Information Security Conference (AISC 2011), Perth, Australia, January 2011. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Colin Boyd and Josef Pieprzyk.

Published

January 2009.

ISBN-13

978-1-920682-96-5.

ISSN

1445-1336.

10 Papers, xiv+87 pages.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 45.5% (10 from 22).


Volume Citation

Papers Included in the Volume

Nakamura, T., Inenaga, S., Baba, K., Ikeda, D. and Yasuura, H. (2011). An Anonymous Authentication Protocol with Single-database PIR. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 3-8. abstractpdfBibTeXEndNoteGS

Agnesse, A. and Pedicini, M. (2011). Cube Attack in Finite Fields of Higher Order. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 9-14. abstractpdfBibTeXEndNoteGS

Kaosar, M. G., Paulet, R. and Yi, X. (2011). Secure Two-Party Association Rule Mining. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 15-22. abstractpdfBibTeXEndNoteGS

Corney, M., Mohay, G. and Clark, A. (2011). Detection of Anomalies from User Profiles Generated from System Logs. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 23-32. abstractpdfBibTeXEndNoteGS

Le, V. L., Welch, I., Gao, X. and Komisarczuk, P. (2011). Identification of Potential Malicious Web Pages. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 33-40. abstractpdfBibTeXEndNoteGS

Lackner, G. and Teufl, P. (2011). IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 41-50. abstractpdfBibTeXEndNoteGS

Bai, Y. and Khan, K. (2011). A Modal Logic for Information System Security. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 51-56. abstractpdfBibTeXEndNoteGS

Campbell, S., Chan, S. and Lee, J. (2011). Detection of Fast Flux Service Networks. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 57-66. abstractpdfBibTeXEndNoteGS

Palmer, B., Bubendorfer, K. and Welch, I. (2011). Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 67-76. abstractpdfBibTeXEndNoteGS

Ries, T., State, R. and Panchenko, A. (2011). Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. In Proc. Australasian Information Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. 77-86. abstractpdfBibTeXEndNoteGS

Papers listed: 10

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 5 Jan 2011