|
| | | |
Volume 125 - Tenth Australasian Information Security Conference(AISC 2012), Melbourne, Australia, January 2012This volume contains papers presented at the Tenth Australasian Information Security Conference (AISC 2012), Melbourne, Australia, January 2012. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 43.5% (10 from 23). |
Volume CitationPieprzyk, J. and Thomborson, C. Eds. (2012). Proceedings of the Tenth Australasian Information Security Conference (AISC 2012). CRPIT. 125. Melbourne, Australia, ACS.
Papers Included in the VolumeLee, P.H., Parampalli, U., Narayan, S. (2012). Efficient Identity-based Signcryption without Random Oracles. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 3-14. |
| Suppakitpaisarn, V., Edahiro, M. and Imai, H. (2012). Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J. and Thomborson, C. Eds., ACS. 15-26. |
| Alhamdan, A., Bartlett, H., Simpson, L., Dawson E. and Wong, K. K. (2012). State convergence in the initialisation of the Sfinks stream cipher. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 27-32. |
| Orumiehchiha, M.A., Pieprzyk, J, and Steinfeld, R. (2012). Cryptanalysis of RC4-Based Hash Function. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 33-38. |
| Radke, K., Boyd, C., Nieto, J.G. and Brereton, M. (2012). Towards a Secure Human-and-Computer Mutual Authentication Protocol. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 39-46. |
| Seifi, Y., Suriadi, S., Foo, E. and Boyd, C. (2012). Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 47-58. |
| Mills, C., Fidge, C. J. and Corney, D. (2012). Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 59-70. |
| Doble, C., Fidge, C. J. and Corney, D. (2012). Data Flow Analysis of Embedded Program Expressions. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 71-82. |
| Hauser, C., Tronel, F., Reid, J. and Fidge, C. (2012). A taint marking approach to confidentiality violation detection. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 83-90. |
| Lee , K., Nieto, J. M. G. and Boyd, C. (2012). Improving the Efficiency of RFID Authentication with Pre-Computation. In Proc. Australasian Information Security Conference (AISC 2012), Melbourne, Australia. CRPIT, 125. Pieprzyk, J.and Thomborson, C. Eds., ACS. 91-100. |
|
Papers listed: 10
|