Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 105 - Information Security 2010

(AISC 2010), Brisbane, Australia, January 2010

This volume contains papers presented at the Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia, January 2010. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Colin Boyd and Willy Susilo.

Published

January 2010.

ISBN-13

978-1-920682-86-6.

ISSN

1445-1336.

10 Papers, xvi+95 pages, softcover.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 47.6% (10 from 21).


Volume Citation

Papers Included in the Volume

Dawson, E., Reid, J., Salim, F. and Burdon, M. (2010). Information Sharing in the 21st century: Progress and Challenges. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 2. abstractpdfBibTeXEndNoteGS

Wang, P., Wang, H. and Pieprzyk, J. (2010). Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 5-11. abstractpdfBibTeXEndNoteGS

Tang, M. and Fidge, C. (2010). Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 12-21. abstractpdfBibTeXEndNoteGS

Chrobok, N., Trotman, A. and O’Keefe, R. (2010). Advantages and vulnerabilities of pull-based email-delivery. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 22-31. abstractpdfBibTeXEndNoteGS

Salim, F., Reid, J. and Dawson, E. (2010). An Administrative Model for UCON ABC. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 32-38. abstractpdfBibTeXEndNoteGS

Lang, S. R. and Williams, N. (2010). Impeding CAPTCHA Breakers with Visual Decryption. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 39-46. abstractpdfBibTeXEndNoteGS

Alfawaz, S., Nelson, K. and Mohannak, K. (2010). Information security culture: A Behaviour Compliance Conceptual Framework. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 47-55. abstractpdfBibTeXEndNoteGS

Stebila, D., Udupi, P. and Chang, S. (2010). Multi-Factor Password-Authenticated Key Exchange. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 56-66. abstractpdfBibTeXEndNoteGS

Wong, K. K.-H., Carter, G. and Dawson, E. (2010). An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 67-74. abstractpdfBibTeXEndNoteGS

Lippold, G. and Nieto, J. G. (2010). Certificateless Key Agreement in the Standard Model. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 75-85. abstractpdfBibTeXEndNoteGS

Halunen, K., Kortelainen, J. and Kortelainen, T. (2010). Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 86-93. abstractpdfBibTeXEndNoteGS

Papers listed: 11

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 20 Dec 2009