Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 125 - Tenth Australasian Information Security Conference

(AISC 2012), Melbourne, Australia, January 2012

This volume contains papers presented at the Tenth Australasian Information Security Conference (AISC 2012), Melbourne, Australia, January 2012. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Josef Pieprzyk and Clark Thomborson.

Published

January 2012.

ISBN-13

978-1-921770-06-7.

ISSN

1445-1336.

10 Papers, xiv+101 pages .

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 43.5% (10 from 23).


Volume Citation

Pieprzyk, J. and Thomborson, C. Eds. (2012). Proceedings of the Tenth Australasian Information Security Conference (AISC 2012). CRPIT. 125. Melbourne, Australia, ACS.


Papers Included in the Volume

Lee, P.H., Parampalli, U., Narayan, S. (2012). Efficient Identity-based Signcryption without Random Oracles. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 3-14. abstractpdfBibTeXEndNoteGS

Suppakitpaisarn, V., Edahiro, M. and Imai, H. (2012). Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J. and Thomborson, C. Eds., ACS. 15-26. abstractpdfBibTeXEndNoteGS

Alhamdan, A., Bartlett, H., Simpson, L., Dawson E. and Wong, K. K. (2012). State convergence in the initialisation of the Sfinks stream cipher. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 27-32. abstractpdfBibTeXEndNoteGS

Orumiehchiha, M.A., Pieprzyk, J, and Steinfeld, R. (2012). Cryptanalysis of RC4-Based Hash Function. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 33-38. abstractpdfBibTeXEndNoteGS

Radke, K., Boyd, C., Nieto, J.G. and Brereton, M. (2012). Towards a Secure Human-and-Computer Mutual Authentication Protocol. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 39-46. abstractpdfBibTeXEndNoteGS

Seifi, Y., Suriadi, S., Foo, E. and Boyd, C. (2012). Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 47-58. abstractpdfBibTeXEndNoteGS

Mills, C., Fidge, C. J. and Corney, D. (2012). Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 59-70. abstractpdfBibTeXEndNoteGS

Doble, C., Fidge, C. J. and Corney, D. (2012). Data Flow Analysis of Embedded Program Expressions. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 71-82. abstractpdfBibTeXEndNoteGS

Hauser, C., Tronel, F., Reid, J. and Fidge, C. (2012). A taint marking approach to confidentiality violation detection. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 83-90. abstractpdfBibTeXEndNoteGS

Lee , K., Nieto, J. M. G. and Boyd, C. (2012). Improving the Efficiency of RFID Authentication with Pre-Computation. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 91-100. abstractpdfBibTeXEndNoteGS

Papers listed: 10

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 14 Jan 2012