|
| | | |
Volume 98 - Information Security 2009Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009Australian Computer Science Communications, Vol. 31, No. 7This volume contains proceedings of the Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 40.7% (11 from 27). |
Volume CitationBrankovic, L. and Susilo, W., Eds. (2009). Information Security 2009. Proc. Seventh Australasian Information Security Conference (AISC 2009). CRPIT. 98. Wellington, New Zealand, ACS.
Papers Included in the VolumeAlcalde, B., Dubois, E., Mauw, S., Mayer, N. and Radomirovic, S. (2009). Towards a Decision Model Based on Trust and Security Risk Management. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 61-69. |
| Arai, M. and Hidehiko, T. (2009). Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 89-98. |
| Fusenig, V., Staab, E., Sorger, U. and Engel, T. (2009). Slotted Packet Counting Attacks on Anonymity Protocols. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 53-59. |
| Gorantla, M.C., Boyd, C. and Nieto, J.M.G. (2009). Strong Designated Verifier Signature in a Multi-user Setting. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 21-31. |
| Hisil, H., Wong, K.K.-H., Carter, G. and Dawson, E. (2009). Faster Group Operations on Elliptic Curves. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 7-19. |
| Liu, V., Franco, L., Caelli, W., May, L. and Sahama, T. (2009). Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC). In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 99-108. |
| Notoatmodjo, G. and Thomborson, C. (2009). Passwords and Perceptions. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 71-78. |
| Reza Z'aba, M., Raddum, H., Simpson, L., Dawson, E., Henricksen, M. and Wong, K. (2009). Algebraic Analysis of LEX. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 33-45. |
| Terada, R. and Ueda, E.T. (2009). A New Version of the RC6 Algorithm, Stronger against chi^2 Cryptanalysis. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 47-52. |
| Thomborson, C. (2009). Foundation for Systems Security. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 3-3. |
| Tu, Y.-C. and Thomborson, C. (2009). Preliminary Security Specification for New Zealand's igovt System. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 79-88. |
|
Papers listed: 11
|