Advertisement

© 2018

Information Security and Privacy

23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings

  • Willy Susilo
  • Guomin Yang
Conference proceedings ACISP 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10946)

Also part of the Security and Cryptology book sub series (LNSC, volume 10946)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Foundation

    1. Front Matter
      Pages 1-1
    2. Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu
      Pages 3-12
    3. Yunhua Wen, Shengli Liu
      Pages 13-27
    4. Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
      Pages 28-44
    5. Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
      Pages 64-82
    6. Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
      Pages 101-113
    7. Souradyuti Paul, Ananya Shrivastava
      Pages 114-131
  3. Symmetric-Key Cryptography

    1. Front Matter
      Pages 133-133
    2. Ryoma Ito, Atsuko Miyaji
      Pages 154-171
    3. Nicolas Marrière, Valérie Nachef, Emmanuel Volte
      Pages 188-206
    4. Sumanta Sarkar, Habeeb Syed
      Pages 207-224
  4. Public-Key Cryptography

    1. Front Matter
      Pages 243-243
    2. Xavier Boyen, Thomas Haines
      Pages 245-264
    3. Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu
      Pages 265-283

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.

The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Keywords

authentication computer crime cryptocurrency cryptography cryptology data mining data privacy digital signature electronic document identification systems encryption privacy preserving public key cryptography public keys (PK) random oracle model secret key semantics software engineering structural design system security wireless telecommunication systems

Editors and affiliations

  1. 1.University of WollongongWollongongAustralia
  2. 2.University of WollongongWollongongAustralia

Bibliographic information

Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Engineering
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace