Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 81 - Information Security 2008

Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia, January 2008

Australian Computer Science Communications, Vol. 30, No. 7

This volume contains proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia, January 2008. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Ljiljana Brankovic and Mirka Miller.

Published

January 2008.

ISBN-13

978-1-920682-62-0.

ISSN

1445-1336.

15 Papers, xiv+122 pages.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 48.1% (13 from 27).


Volume Citation

Brankovic, L. and Miller, M., Eds. (2008). Information Security 2008. Proc. Sixth Australasian Information Security Conference (AISC 2008). CRPIT. 81. Wollongong, NSW, Australia, ACS.


Papers Included in the Volume

Alzaid, H., Foo, E. and Gonzalez Nieto, J.M. (2008). Secure Data Aggregation in Wireless Sensor Network: a survey. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 93-105. abstractpdfBibTeXEndNoteGS

AlZomai, M., Alfayyadh, B., Josang, A. and McCullagh, A. (2008). An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 65-73. abstractpdfBibTeXEndNoteGS

Ayed, S., Cuppens-Boulahia, N. and Cuppens, F. (2008). Deploying Access Control in Distributed Workflow. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 9-17. abstractpdfBibTeXEndNoteGS

Biham, E. and Seberry, J. (2008). A New Very Fast Stream Cipher : Tpy. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 5. abstractBibTeXEndNoteGS

Caballero-Gil, P. (2008). Current Topics in Security of Mobile Ad-hoc NETworks. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 3. abstractpdfBibTeXEndNoteGS

Fusenig, V., Spiewak, D. and Engel, T. (2008). Acimn: A protocol for Anonymous Communication In Multi hop wireless networks. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 107-114. abstractpdfBibTeXEndNoteGS

Fuster-Sabater, A. and Caballero-Gil, P. (2008). Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 47-52. abstractpdfBibTeXEndNoteGS

Gorantla, M.C., Boyd, C. and Gonzalez Nieto, J.M. (2008). ID-based One-pass Authenticated Key Establishment. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 39-46. abstractpdfBibTeXEndNoteGS

Josang, A. and Alfayyadh, B. (2008). Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 53-58. abstractpdfBibTeXEndNoteGS

Murray, A. and Grove, D. (2008). PULSE: a Pluggable User-space Linux Security Environment paper. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 19-25. abstractpdfBibTeXEndNoteGS

Pasupathinathan, V., Pieprzyk, J. and Wang, H. (2008). Formal Security Analysis of Australian E-passport Implementation. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 75-82. abstractpdfBibTeXEndNoteGS

Pham, Q., Reid, J., McCullagh, A. and Dawson, E. (2008). Commitment Issues in Delegation Process. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 27-38. abstractpdfBibTeXEndNoteGS

Ren, Q., Mu, Y. and Susilo, W. (2008). Mitigating Phishing with ID-based Online/Offline Authentication. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 59-64. abstractpdfBibTeXEndNoteGS

Suriadi, S., Foo, E. and Du, R. (2008). Layered Identity Infrastructure Model for Identity Meta Systems. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 83-92. abstractpdfBibTeXEndNoteGS

Wiander, T. (2008). Implementing the ISO/IEC 17799 standard in practice - experiences on audit phases. In Proc. Sixth Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. CRPIT, 81. Brankovic, L. and Miller, M., Eds., ACS. 115-119. abstractpdfBibTeXEndNoteGS

Papers listed: 15

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 19 Dec 2008