@inproceedings{CRPITV105P2,
Author = { Dawson, E., Reid, J., Salim, F. and Burdon, M. },
Title = { Information Sharing in the 21st century: Progress and Challenges },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 2 },
URL  = { http://crpit.com/confpapers/CRPITV105Dawson.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P5-11,
Author = { Wang, P., Wang, H. and Pieprzyk, J. },
Title = { Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 5-11 },
URL  = { http://crpit.com/confpapers/CRPITV105Wang.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P12-21,
Author = { Tang, M. and Fidge, C. },
Title = { Reconstruction of Falsified Computer Logs for Digital Forensics Investigations },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 12-21 },
URL  = { http://crpit.com/confpapers/CRPITV105Tang.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P22-31,
Author = { Chrobok, N., Trotman, A. and O’Keefe, R. },
Title = { Advantages and vulnerabilities of pull-based email-delivery },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 22-31 },
URL  = { http://crpit.com/confpapers/CRPITV105Chrobok.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P32-38,
Author = { Salim, F., Reid, J. and Dawson, E. },
Title = { An Administrative Model for UCON ABC },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 32-38 },
URL  = { http://crpit.com/confpapers/CRPITV105Salim.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P39-46,
Author = { Lang, S. R. and Williams, N. },
Title = { Impeding CAPTCHA Breakers with Visual Decryption },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 39-46 },
URL  = { http://crpit.com/confpapers/CRPITV105Lang.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P47-55,
Author = { Alfawaz, S., Nelson, K. and Mohannak, K. },
Title = { Information security culture: A Behaviour Compliance Conceptual Framework },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 47-55 },
URL  = { http://crpit.com/confpapers/CRPITV105Alfawaz.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P56-66,
Author = { Stebila, D., Udupi, P. and Chang, S. },
Title = { Multi-Factor Password-Authenticated Key Exchange },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 56-66 },
URL  = { http://crpit.com/confpapers/CRPITV105Stebila.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P67-74,
Author = { Wong, K. K.-H., Carter, G. and Dawson, E. },
Title = { An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 67-74 },
URL  = { http://crpit.com/confpapers/CRPITV105Wong.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P75-85,
Author = { Lippold, G. and Nieto, J. G. },
Title = { Certificateless Key Agreement in the Standard Model },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 75-85 },
URL  = { http://crpit.com/confpapers/CRPITV105Lippold.pdf },
Year = { 2010 }
}


@inproceedings{CRPITV105P86-93,
Author = { Halunen, K., Kortelainen, J. and Kortelainen, T. },
Title = { Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions },
BookTitle = { Eighth Australasian Information Security Conference (AISC 2010) },
Editor = { Boyd, C. and Susilo, W. },
Series= {CRPIT},
Address= { Brisbane, Australia },
Publisher = {ACS},
Volume = { 105 },
Pages = { 86-93 },
URL  = { http://crpit.com/confpapers/CRPITV105Halunen.pdf },
Year = { 2010 }
}