Information Security and Privacy

21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II

  • Joseph K. Liu
  • Ron Steinfeld
Conference proceedings ACISP 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9723)

Also part of the Security and Cryptology book sub series (LNSC, volume 9723)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Signature and Key Management

    1. Front Matter
      Pages 1-1
    2. Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang
      Pages 3-20
    3. Shengmin Xu, Guomin Yang, Yi Mu, Sha Ma
      Pages 21-36
    4. Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione
      Pages 37-54
  3. Public Key and Identity-Based Encryption

    1. Front Matter
      Pages 55-55
    2. Xiaofen Wang, Yi Mu
      Pages 57-72
    3. Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He
      Pages 73-86
    4. Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang et al.
      Pages 87-102
    5. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang
      Pages 103-119
    6. Xiaodong Lin, Rongxing Lu
      Pages 120-133
    7. Shi-Feng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu
      Pages 134-150
  4. Searchable Encryption

    1. Front Matter
      Pages 151-151
    2. Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe L. Jiang, Jin Li
      Pages 153-169
    3. Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen
      Pages 170-186
    4. Shiwei Zhang, Guomin Yang, Yi Mu
      Pages 187-203
  5. Broadcast Encryption

    1. Front Matter
      Pages 205-205
    2. Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng
      Pages 207-222
    3. Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen
      Pages 223-239
  6. Mathematical Primitives

    1. Front Matter
      Pages 241-241
    2. Atsushi Takayasu, Noboru Kunihiro
      Pages 243-257
    3. Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
      Pages 258-268
    4. Takashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro
      Pages 269-284
    5. Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian
      Pages 285-297
  7. Symmetric Cipher

    1. Front Matter
      Pages 299-299
    2. Nasour Bagheri, Florian Mendel, Yu Sasaki
      Pages 301-316
    3. Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
      Pages 317-332
    4. Jiageng Chen, Je Sen Teh, Chunhua Su, Azman Samsudin, Junbin Fang
      Pages 333-346
    5. Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
      Pages 409-424
  8. Short Papers-Public Key and Identity-Based Encryption

    1. Front Matter
      Pages 425-425
    2. Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi
      Pages 427-434
  9. Short Papers-Biometric Security

    1. Front Matter
      Pages 435-435
    2. Ying Han Pang, Ean Yee Khor, Shih Yin Ooi
      Pages 437-445
  10. Short Papers-Digital Forensics

    1. Front Matter
      Pages 455-455
    2. Min Yang, Fei Xu, Kam-Pui Chow
      Pages 457-464
  11. Short Papers-National Security Infrastructure

    1. Front Matter
      Pages 465-465
    2. Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
      Pages 467-477
  12. Short Papers-Mobile Security

    1. Front Matter
      Pages 479-479
    2. Yao Cheng, Yingjiu Li, Robert H. Deng
      Pages 481-489
  13. Short Papers-Network Security

    1. Front Matter
      Pages 491-491
  14. Short Papers-Pseudo Random/One-way Function

    1. Front Matter
      Pages 503-503
    2. Jhordany Rodriguez Parra, Terence Chan, Siu-Wai Ho
      Pages 505-513
  15. Back Matter
    Pages 515-517

Other volumes

  1. 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I
  2. Information Security and Privacy
    21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II

About these proceedings


The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.

The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.


cloud services security cryptography mathematical foundations of cryptography security engineering social aspects of security and privacy

Editors and affiliations

  • Joseph K. Liu
    • 1
  • Ron Steinfeld
    • 2
  1. 1.Monash University MelbourneAustralia
  2. 2.Monash University MelbourneAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-40366-3
  • Online ISBN 978-3-319-40367-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment