Advertisement

Information Security and Privacy

13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

  • Editors
  • Yi Mu
  • Willy Susilo
  • Jennifer Seberry
Conference proceedings ACISP 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5107)

Table of contents

  1. Front Matter
  2. Xavier Boyen
    Pages 1-5
  3. Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa
    Pages 21-36
  4. Jiayuan Sui, Douglas R. Stinson
    Pages 37-52
  5. Alfred Menezes, Berkant Ustaoglu
    Pages 53-68
  6. Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson
    Pages 69-83
  7. Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo
    Pages 84-97
  8. Takato Hirano, Koichiro Wada, Keisuke Tanaka
    Pages 98-112
  9. Jacek Cichoń, Marek Klonowski, Mirosław Kutyłowski
    Pages 128-140
  10. Huafei Zhu
    Pages 141-154
  11. Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang
    Pages 155-169
  12. Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan
    Pages 170-186
  13. Debra L. Cook, Moti Yung, Angelos D. Keromytis
    Pages 187-202
  14. Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
    Pages 203-215
  15. Lei Zhang, Wentao Zhang, Wenling Wu
    Pages 216-229
  16. Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
    Pages 230-238
  17. Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin
    Pages 239-253
  18. Somitra Kumar Sanadhya, Palash Sarkar
    Pages 254-266
  19. Florian Mendel, Martin Schläffer
    Pages 267-281
  20. Yu Sasaki, Kazumaro Aoki
    Pages 282-296
  21. Risto M. Hakala, Kaisa Nyberg
    Pages 297-305
  22. Subhamoy Maitra, Goutam Paul
    Pages 306-320
  23. Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
    Pages 321-335
  24. V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar
    Pages 336-349
  25. Pankaj Kohli, Bezawada Bruhadeshwar
    Pages 376-390
  26. Min Li, Hua Wang, Ashley Plank, Jianming Yong
    Pages 391-403
  27. Silvana Medoš, Serdar Boztaş
    Pages 419-432
  28. Christophe Doche, Laurent Habsieger
    Pages 433-446
  29. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.

The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.

Keywords

anonymity biometrics block ciphers classifier cryptanalysis cryptographic hash function cryptographic protocols cryptography cryptosystems data security digital signature schemes distributed system elliptic curve cryptography encryption faul

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-70500-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-69971-2
  • Online ISBN 978-3-540-70500-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace