Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 138 - Eleventh Australasian Information Security Conference

(AISC 2013), Adelaide, Australia., February 2013

This volume contains papers presented at the Eleventh Australasian Information Security Conference (AISC 2013), Adelaide, Australia., February 2013. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Clark Thomborson and Udaya Parampalli..

Published

February 2013.

ISBN-13

978-1-921770-23-4..

ISSN

1445-1336.

8 Papers, ix+79 pages.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 44.4% (8 from 18).


Volume Citation

Clark Thomborson and Udaya Parampalli. Eds. (2013). Proceedings of the Eleventh Australasian Information Security Conference (AISC 2013). CRPIT. 138. Adelaide, Australia., ACS.


Papers Included in the Volume

Alhamdan, A, Bartlett, H., Dawson, Ed., Simpson, L. and Wong, K.K. (2013). Slid Pairs in the Initialisation of the A5/1 Stream Cipher. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 3-12. abstractpdfBibTeXEndNoteGS

Asaar, M.R., Vardasbi, A. and Salmasizadeh, M. (2013). Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 13-25. abstractpdfBibTeXEndNoteGS

Paulet, R. and Yi, X. (2013). Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 25-30. abstractpdfBibTeXEndNoteGS

Grove, D., Murray, A., Gerhardy, D., Turnbull, B., Tobin, T. and Moir, C. (2013). An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 31-38. abstractpdfBibTeXEndNoteGS

Ariffin, A., Choo, K.R. and Slay, J. (2013). Digital Camcorder Forensics. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 39-48. abstractpdfBibTeXEndNoteGS

Le, V.L., Welch, I., Gao, X. and Komisarczuk, P. (2013). Anatomy of Drive-by Download Attack. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 49-58. abstractpdfBibTeXEndNoteGS

Mohammadzadeh, H., Mansoori, M. and Welch, I. (2013). Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 59-66. abstractpdfBibTeXEndNoteGS

Morris, T.H., Vaughn, R.B. and Sitnikova, E. (2013). Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 67-76. abstractpdfBibTeXEndNoteGS

Alpcan, T. (2013). A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 77-78. abstractpdfBibTeXEndNoteGS

Papers listed: 9

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 17 May 2013