|
| | | |
Volume 81 - Information Security 2008Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia, January 2008Australian Computer Science Communications, Vol. 30, No. 7This volume contains proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia, January 2008. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 48.1% (13 from 27). |
Volume CitationBrankovic, L. and Miller, M., Eds. (2008). Information Security 2008. Proc. Sixth Australasian Information Security Conference (AISC 2008). CRPIT. 81. Wollongong, NSW, Australia, ACS.
Papers Included in the VolumeAlzaid, H., Foo, E. and Gonzalez Nieto, J.M. (2008). Secure Data Aggregation in Wireless Sensor Network: a survey. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 93-105. |
| AlZomai, M., Alfayyadh, B., Josang, A. and McCullagh, A. (2008). An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 65-73. |
| Ayed, S., Cuppens-Boulahia, N. and Cuppens, F. (2008). Deploying Access Control in Distributed Workflow. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 9-17. |
| Biham, E. and Seberry, J. (2008). A New Very Fast Stream Cipher : Tpy. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 5. |
| Caballero-Gil, P. (2008). Current Topics in Security of Mobile Ad-hoc NETworks. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 3. |
| Fusenig, V., Spiewak, D. and Engel, T. (2008). Acimn: A protocol for Anonymous Communication In Multi hop wireless networks. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 107-114. |
| Fuster-Sabater, A. and Caballero-Gil, P. (2008). Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 47-52. |
| Gorantla, M.C., Boyd, C. and Gonzalez Nieto, J.M. (2008). ID-based One-pass Authenticated Key Establishment. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 39-46. |
| Josang, A. and Alfayyadh, B. (2008). Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 53-58. |
| Murray, A. and Grove, D. (2008). PULSE: a Pluggable User-space Linux Security Environment paper. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 19-25. |
| Pasupathinathan, V., Pieprzyk, J. and Wang, H. (2008). Formal Security Analysis of Australian E-passport Implementation. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 75-82. |
| Pham, Q., Reid, J., McCullagh, A. and Dawson, E. (2008). Commitment Issues in Delegation Process. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 27-38. |
| Ren, Q., Mu, Y. and Susilo, W. (2008). Mitigating Phishing with ID-based Online/Offline Authentication. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 59-64. |
| Suriadi, S., Foo, E. and Du, R. (2008). Layered Identity Infrastructure Model for Identity Meta Systems. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 83-92. |
| Wiander, T. (2008). Implementing the ISO/IEC 17799 standard in practice - experiences on audit phases. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 115-119. |
|
Papers listed: 15
|