Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 98 - Information Security 2009

Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009

Australian Computer Science Communications, Vol. 31, No. 7

This volume contains proceedings of the Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand, January 2009. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Ljiljana Brankovic and Willy Susilo .

Published

January 2009.

ISBN-13

978-1-920682-79-8.

ISSN

1445-1336.

11 Papers, xiv+120 pages.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 40.7% (11 from 27).


Volume Citation

Brankovic, L. and Susilo, W., Eds. (2009). Information Security 2009. Proc. Seventh Australasian Information Security Conference (AISC 2009). CRPIT. 98. Wellington, New Zealand, ACS.


Papers Included in the Volume

Alcalde, B., Dubois, E., Mauw, S., Mayer, N. and Radomirovic, S. (2009). Towards a Decision Model Based on Trust and Security Risk Management. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 61-69. abstractpdfBibTeXEndNoteGS

Arai, M. and Hidehiko, T. (2009). Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 89-98. abstractpdfBibTeXEndNoteGS

Fusenig, V., Staab, E., Sorger, U. and Engel, T. (2009). Slotted Packet Counting Attacks on Anonymity Protocols. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 53-59. abstractpdfBibTeXEndNoteGS

Gorantla, M.C., Boyd, C. and Nieto, J.M.G. (2009). Strong Designated Verifier Signature in a Multi-user Setting. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 21-31. abstractpdfBibTeXEndNoteGS

Hisil, H., Wong, K.K.-H., Carter, G. and Dawson, E. (2009). Faster Group Operations on Elliptic Curves. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 7-19. abstractpdfBibTeXEndNoteGS

Liu, V., Franco, L., Caelli, W., May, L. and Sahama, T. (2009). Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC). In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 99-108. abstractpdfBibTeXEndNoteGS

Notoatmodjo, G. and Thomborson, C. (2009). Passwords and Perceptions. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 71-78. abstractpdfBibTeXEndNoteGS

Reza Z'aba, M., Raddum, H., Simpson, L., Dawson, E., Henricksen, M. and Wong, K. (2009). Algebraic Analysis of LEX. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 33-45. abstractpdfBibTeXEndNoteGS

Terada, R. and Ueda, E.T. (2009). A New Version of the RC6 Algorithm, Stronger against chi^2 Cryptanalysis. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 47-52. abstractpdfBibTeXEndNoteGS

Thomborson, C. (2009). Foundation for Systems Security. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 3-3. BibTeXEndNoteGS

Tu, Y.-C. and Thomborson, C. (2009). Preliminary Security Specification for New Zealand's igovt System. In Proc. Seventh Australasian Information Security Conference (AISC 2009), Wellington, New Zealand. CRPIT, 98. Brankovic, L. and Susilo, W., Eds., ACS. 79-88. abstractpdfBibTeXEndNoteGS

Papers listed: 11

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Mar 2009