@inproceedings{CRPITV105P2, Author = { Dawson, E., Reid, J., Salim, F. and Burdon, M. }, Title = { Information Sharing in the 21st century: Progress and Challenges }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 2 }, URL = { http://crpit.com/confpapers/CRPITV105Dawson.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P5-11, Author = { Wang, P., Wang, H. and Pieprzyk, J. }, Title = { Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 5-11 }, URL = { http://crpit.com/confpapers/CRPITV105Wang.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P12-21, Author = { Tang, M. and Fidge, C. }, Title = { Reconstruction of Falsified Computer Logs for Digital Forensics Investigations }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 12-21 }, URL = { http://crpit.com/confpapers/CRPITV105Tang.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P22-31, Author = { Chrobok, N., Trotman, A. and O’Keefe, R. }, Title = { Advantages and vulnerabilities of pull-based email-delivery }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 22-31 }, URL = { http://crpit.com/confpapers/CRPITV105Chrobok.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P32-38, Author = { Salim, F., Reid, J. and Dawson, E. }, Title = { An Administrative Model for UCON ABC }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 32-38 }, URL = { http://crpit.com/confpapers/CRPITV105Salim.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P39-46, Author = { Lang, S. R. and Williams, N. }, Title = { Impeding CAPTCHA Breakers with Visual Decryption }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 39-46 }, URL = { http://crpit.com/confpapers/CRPITV105Lang.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P47-55, Author = { Alfawaz, S., Nelson, K. and Mohannak, K. }, Title = { Information security culture: A Behaviour Compliance Conceptual Framework }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 47-55 }, URL = { http://crpit.com/confpapers/CRPITV105Alfawaz.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P56-66, Author = { Stebila, D., Udupi, P. and Chang, S. }, Title = { Multi-Factor Password-Authenticated Key Exchange }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 56-66 }, URL = { http://crpit.com/confpapers/CRPITV105Stebila.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P67-74, Author = { Wong, K. K.-H., Carter, G. and Dawson, E. }, Title = { An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 67-74 }, URL = { http://crpit.com/confpapers/CRPITV105Wong.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P75-85, Author = { Lippold, G. and Nieto, J. G. }, Title = { Certificateless Key Agreement in the Standard Model }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 75-85 }, URL = { http://crpit.com/confpapers/CRPITV105Lippold.pdf }, Year = { 2010 } } @inproceedings{CRPITV105P86-93, Author = { Halunen, K., Kortelainen, J. and Kortelainen, T. }, Title = { Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions }, BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) }, Editor = { Boyd, C. and Susilo, W. }, Series= {CRPIT}, Address= { Brisbane, Australia }, Publisher = {ACS}, Volume = { 105 }, Pages = { 86-93 }, URL = { http://crpit.com/confpapers/CRPITV105Halunen.pdf }, Year = { 2010 } }