|
| | | |
Volume 105 - Information Security 2010(AISC 2010), Brisbane, Australia, January 2010This volume contains papers presented at the Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia, January 2010. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 47.6% (10 from 21). |
Volume Citation
Papers Included in the VolumeDawson, E., Reid, J., Salim, F. and Burdon, M. (2010). Information Sharing in the 21st century: Progress and Challenges. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 2. |     
| Wang, P., Wang, H. and Pieprzyk, J. (2010). Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 5-11. |     
| Tang, M. and Fidge, C. (2010). Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 12-21. |     
| Chrobok, N., Trotman, A. and O’Keefe, R. (2010). Advantages and vulnerabilities of pull-based email-delivery. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 22-31. |     
| Salim, F., Reid, J. and Dawson, E. (2010). An Administrative Model for UCON ABC. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 32-38. |     
| Lang, S. R. and Williams, N. (2010). Impeding CAPTCHA Breakers with Visual Decryption. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 39-46. |     
| Alfawaz, S., Nelson, K. and Mohannak, K. (2010). Information security culture: A Behaviour Compliance Conceptual Framework. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 47-55. |     
| Stebila, D., Udupi, P. and Chang, S. (2010). Multi-Factor Password-Authenticated Key Exchange. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 56-66. |     
| Wong, K. K.-H., Carter, G. and Dawson, E. (2010). An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 67-74. |     
| Lippold, G. and Nieto, J. G. (2010). Certificateless Key Agreement in the Standard Model. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 75-85. |     
| Halunen, K., Kortelainen, J. and Kortelainen, T. (2010). Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions. In Proc. Eighth Australasian Information Security Conference (AISC 2010), Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 86-93. |     
|
Papers listed: 11
|