Information Security and Privacy

22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II

  • Josef Pieprzyk
  • Suriadi Suriadi
Conference proceedings ACISP 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10343)

Also part of the Security and Cryptology book sub series (LNSC, volume 10343)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Symmetric Cryptography

    1. Front Matter
      Pages 1-1
    2. Sumanta Sarkar, Habeeb Syed
      Pages 3-18
    3. Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
      Pages 19-37
  3. Software Security

    1. Front Matter
      Pages 59-59
    2. Fan Jiang, Cen Zhang, Shaoyin Cheng
      Pages 61-79
    3. Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu
      Pages 80-94
    4. Yan Lin, Xiaoxiao Tang, Debin Gao
      Pages 95-112
  4. Network Security

    1. Front Matter
      Pages 113-113
    2. Weizhong Qiang, JiaZhen Guo, Hai Jin, Weifeng Li
      Pages 135-150
  5. Malware Detection

    1. Front Matter
      Pages 151-151
    2. Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu
      Pages 153-172
    3. Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang et al.
      Pages 173-189
  6. Privacy

    1. Front Matter
      Pages 191-191
    2. Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, Ye Wang
      Pages 214-234
    3. Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Su Peng
      Pages 235-248
    4. Alex Davidson, Carlos Cid
      Pages 261-278
  7. Authentication

    1. Front Matter
      Pages 279-279
    2. Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu
      Pages 281-300
    3. Weizhi Meng, Wang Hao Lee, Man Ho Au, Zhe Liu
      Pages 301-313
    4. Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong
      Pages 314-331
  8. Elliptic Curve Cryptography

    1. Front Matter
      Pages 333-333
    2. Theo Fanuela Prabowo, Chik How Tan
      Pages 335-348
    3. Eunkyung Kim, Mehdi Tibouchi
      Pages 349-365
    4. Reza Rezaeian Farashahi, Seyed Gholamhossein Hosseini
      Pages 366-378
  9. Short Papers

    1. Front Matter
      Pages 379-379
    2. Abhishek Singh, Binanda Sengupta, Sushmita Ruj
      Pages 381-389
    3. Moritz Horsch, Johannes Braun, Dominique Metz, Johannes Buchmann
      Pages 390-397
    4. Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler et al.
      Pages 398-405
    5. Swapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury
      Pages 406-413
    6. Clark Thomborson, Marc Jeanmougin
      Pages 414-421
    7. Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang, Guozhong Sun
      Pages 435-442
    8. Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu, Dingding Jia
      Pages 443-451
    9. Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke, Ernest Foo
      Pages 452-459
  10. Back Matter
    Pages 469-471

Other volumes

  1. 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I
  2. Information Security and Privacy
    22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II

About these proceedings


The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.

The 45 revised full papers,  2 keynotes, 8 invited papers and 10 short papers  presented in this double volume, were carefully revised and selected from  150 submissions. The papers of Part I (LNCS 10342) are organized in topical  sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers  of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.


cloud services security cryptography mathematical foundations of cryptography security engineering social aspects of security and privacy biometrics bitcoin cyber-physical system database security embedded security system formal methods hash functions mobile platform security network security outsourcing of computation privacy-preserving protocols public key cryptography storage security symmetric cryptography vulnerability management

Editors and affiliations

  1. 1.Queensland University of TechnologyBrisbaneAustralia
  2. 2.Queensland University of TechnologyBrisbaneAustralia

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment