Information Security and Privacy

7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3–5, 2002 Proceedings

  • Lynn Batten
  • Jennifer Seberry
Conference proceedings ACISP 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Key Handling

    1. Yanjiang Yang, Feng Bao, Robert H. Deng
      Pages 17-24
    2. A. Clark, Ed Dawson, J. Fuller, J. Golić, H -J. Lee, William Millan et al.
      Pages 25-39
    3. Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
      Pages 40-55
  3. Trust and Secret Sharing

    1. Marie Henderson, Robert Coulter, Ed Dawson, Eiji Okamoto
      Pages 56-70
    2. S. G. Barwick, W. -A. Jackson, Keith M. Martin, Peter R. Wild
      Pages 71-88
    3. Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu
      Pages 107-120
    4. Josef Pieprzyk, Xian-Mo Zhang
      Pages 121-135
  4. Fast Computation

    1. Wieland Fischer, Jean-Pierre Seifert
      Pages 136-143
  5. Cryptanalysis I

    1. Hongjun Wu, Feng Bao
      Pages 154-158
    2. David Soldera, Jennifer Seberry, Chengxin Qu
      Pages 159-168
    3. Hongjun Wu
      Pages 169-175
  6. Elliptic Curves

  7. AES

    1. Lauren May, Matt Henricksen, William Millan, Gary Carter, Ed Dawson
      Pages 226-240
  8. Security Management

    1. M. J. Warren, L. M. Batten
      Pages 257-270
    2. Chun Ruan, Vijay Varadharajan
      Pages 271-285
    3. M. Hitchens, Vijay Varadharajan, G. Saunders
      Pages 286-302
  9. Authentication

  10. Invited Talk

  11. Oblivious Transfer

    1. Yi Mu, Junqi Zhang, Vijay Varadharajan
      Pages 395-405
  12. Cryptanalysis II

  13. Dealing with Adversaries

    1. Biljana Cubaleska, Weidong Qiu, Markus Schneider
      Pages 449-463
    2. Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyung-Jin Yang
      Pages 464-481
    3. Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung
      Pages 482-496
    4. M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan
      Pages 497-511
  14. Back Matter
    Pages 513-514

About these proceedings


The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.


AEX Administration Information RSA advanced encryption standard cryptanalysis cryptographic protocols cryptography cryptology data encryption data security privacy secur networks security trust

Editors and affiliations

  • Lynn Batten
    • 1
  • Jennifer Seberry
    • 2
  1. 1.Rusden CampusDeakin UniversityMelbourneAustralia
  2. 2.Department of Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43861-8
  • Online ISBN 978-3-540-45450-2
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking