|
| | | |
Volume 138 - Eleventh Australasian Information Security Conference(AISC 2013), Adelaide, Australia., February 2013This volume contains papers presented at the Eleventh Australasian Information Security Conference (AISC 2013), Adelaide, Australia., February 2013. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 44.4% (8 from 18). |
Volume CitationClark Thomborson and Udaya Parampalli. Eds. (2013). Proceedings of the Eleventh Australasian Information Security Conference (AISC 2013). CRPIT. 138. Adelaide, Australia., ACS.
Papers Included in the VolumeAlhamdan, A, Bartlett, H., Dawson, Ed., Simpson, L. and Wong, K.K. (2013). Slid Pairs in the Initialisation of the A5/1 Stream Cipher. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 3-12. |
| Asaar, M.R., Vardasbi, A. and Salmasizadeh, M. (2013). Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 13-25. |
| Paulet, R. and Yi, X. (2013). Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 25-30. |
| Grove, D., Murray, A., Gerhardy, D., Turnbull, B., Tobin, T. and Moir, C. (2013). An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 31-38. |
| Ariffin, A., Choo, K.R. and Slay, J. (2013). Digital Camcorder Forensics. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 39-48. |
| Le, V.L., Welch, I., Gao, X. and Komisarczuk, P. (2013). Anatomy of Drive-by Download Attack. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 49-58. |
| Mohammadzadeh, H., Mansoori, M. and Welch, I. (2013). Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 59-66. |
| Morris, T.H., Vaughn, R.B. and Sitnikova, E. (2013). Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 67-76. |
| Alpcan, T. (2013). A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). In Proc. Information Security 2013 (AISC 2013), Adelaide, Australia. CRPIT, 138. Thomborson, C. and Parampalli. U. Eds., ACS. 77-78. |
|
Papers listed: 9
|