Information Security and Privacy

7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3–5, 2002 Proceedings

  • Lynn Batten
  • Jennifer Seberry

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Key Handling

    1. Yanjiang Yang, Feng Bao, Robert H. Deng
      Pages 17-24
    2. A. Clark, Ed Dawson, J. Fuller, J. Golić, H -J. Lee, William Millan et al.
      Pages 25-39
    3. Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
      Pages 40-55
  3. Trust and Secret Sharing

    1. Marie Henderson, Robert Coulter, Ed Dawson, Eiji Okamoto
      Pages 56-70
    2. S. G. Barwick, W. -A. Jackson, Keith M. Martin, Peter R. Wild
      Pages 71-88
    3. Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu
      Pages 107-120
    4. Josef Pieprzyk, Xian-Mo Zhang
      Pages 121-135
  4. Fast Computation

    1. Wieland Fischer, Jean-Pierre Seifert
      Pages 136-143
  5. Cryptanalysis I

    1. Hongjun Wu, Feng Bao
      Pages 154-158
    2. David Soldera, Jennifer Seberry, Chengxin Qu
      Pages 159-168
    3. Hongjun Wu
      Pages 169-175
  6. Elliptic Curves

  7. AES

    1. Lauren May, Matt Henricksen, William Millan, Gary Carter, Ed Dawson
      Pages 226-240

About these proceedings

Introduction

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.

Keywords

AEX Administration Information RSA advanced encryption standard cryptanalysis cryptographic protocols cryptography cryptology data encryption data security privacy secur networks security trust

Editors and affiliations

  • Lynn Batten
    • 1
  • Jennifer Seberry
    • 2
  1. 1.Rusden CampusDeakin UniversityMelbourneAustralia
  2. 2.Department of Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45450-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43861-8
  • Online ISBN 978-3-540-45450-2
  • Series Print ISSN 0302-9743
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace