Information Security and Privacy

8th Australasian Conference, ACISP 2003 Wollongong, Australia, July 9–11, 2003 Proceedings

  • Rei Safavi-Naini
  • Jennifer Seberry
Conference proceedings ACISP 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2727)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Privacy and Anonymity

    1. Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng
      Pages 1-12
    2. Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
      Pages 13-26
    3. Pino Persiano, Ivan Visconti
      Pages 27-38
    4. Masayuki Abe, Hideki Imai
      Pages 39-50
  3. Invited Talk (I)

  4. Elliptic Curves

    1. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
      Pages 55-66
    2. Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu
      Pages 67-78
    3. André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz
      Pages 79-92
  5. Crytpanalysis (I)

    1. Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
      Pages 130-141
    2. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
      Pages 142-153
  6. Mobile and Network Security

    1. Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
      Pages 166-179
    2. Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sungwon Sohn
      Pages 180-191
    3. Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim
      Pages 192-203
    4. Ha Yoon Song, Han-gyoo Kim
      Pages 204-213
    5. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
      Pages 214-225
    6. Abhishek Singh, Ola Nordström, Chenghuai Lu, Andre L. M. dos Santos
      Pages 226-236
    7. Sébastien Canard, Jacques Traoré
      Pages 237-248
  7. Invited Talk (II)

    1. Andreas Pashalidis, Chris J. Mitchell
      Pages 249-264
  8. Cryptanalysis (II)

    1. Jaechul Sung, Deukjo Hong, Sangjin Lee
      Pages 265-273
    2. Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
      Pages 274-284
    3. Sung-Ming Yen, SangJae Moon, JaeCheol Ha
      Pages 285-296
  9. Signature

    1. Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, JongIn Lim
      Pages 324-335
    2. Kei Kawauchi, Mitsuru Tada
      Pages 336-349
  10. Cryptosystems (I)

    1. Ivan Damgård, Mads Jurik
      Pages 350-364
    2. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada et al.
      Pages 365-376
    3. Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee
      Pages 377-386
    4. Josef Pieprzyk, David Pointcheval
      Pages 387-401
  11. Invited Talk (III)

    1. Li Gong
      Pages 402-402
  12. Cryptosystems (II)

  13. Key Management

  14. Theory and Hash Functions

    1. Toshihiko Matsuo, Kaoru Kurosawa
      Pages 510-521
    2. Swee-Huay Heng, Kaoru Kurosawa
      Pages 522-531
  15. Back Matter
    Pages 533-534

About these proceedings



This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003.

The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.


cryptography data security digital information privacy security

Editors and affiliations

  • Rei Safavi-Naini
    • 1
  • Jennifer Seberry
    • 1
  1. 1.School of Information Technology and Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40515-3
  • Online ISBN 978-3-540-45067-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking