Advertisement

Information Security and Privacy

19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

  • Willy Susilo
  • Yi Mu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8544)

Table of contents

  1. Front Matter
  2. Cryptanalysis

  3. Cryptographic Protocols

    1. Yuyu Wang, Keisuke Tanaka
      Pages 66-81
    2. Liang Liu, Xiaofeng Chen, Wenjing Lou
      Pages 82-97
    3. Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia
      Pages 115-130
  4. Cryptanalysis

    1. Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu
      Pages 131-147
    2. Zhaojing Ding, Wei Guo, Liangjian Su, Jizeng Wei, Haihua Gu
      Pages 162-175
    3. Atsushi Takayasu, Noboru Kunihiro
      Pages 176-191
  5. Fine-grain Cryptographic Protocols

    1. Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa
      Pages 226-241
    2. Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin
      Pages 242-257
  6. Key Exchange

    1. Janaka Alawatugoda, Colin Boyd, Douglas Stebila
      Pages 258-273
  7. Fundamentals

    1. Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
      Pages 290-305
    2. Nilanjan Datta, Mridul Nandi
      Pages 306-321
  8. Lattices and Homomorphic Encryption

    1. Shi Bai, Steven D. Galbraith
      Pages 322-337
    2. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
      Pages 338-353
  9. Applications

    1. Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei
      Pages 354-369
    2. Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing
      Pages 370-385
    3. Mohammed Shafiul Alam Khan, Chris J. Mitchell
      Pages 386-396
    4. Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, Xiaobo Chu
      Pages 397-412
  10. Short Papers

    1. Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
      Pages 413-421
    2. Philip S. Vejre, Andrey Bogdanov
      Pages 422-429
    3. Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Batten, Su Shunliang, Muttukrishnan Rajarajan
      Pages 430-437
    4. Zhijiao Zhang, Lei Zhang, Yu Chen, Yuanchun Shi
      Pages 438-445
    5. Xingmin Cui, Da Yu, Patrick Chan, Lucas C. K. Hui, S. M. Yiu, Sihan Qing
      Pages 446-453
  11. Back Matter

About these proceedings

Introduction

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Keywords

RSA block and stream ciphers cryptanalysis and other attacks cryptographic applications cryptographic protocols cryptographic theory cryptography digital signatures formal methods and theory of security homomorphic encryption information security key exchange protocols lattices mobile security security services signcryption

Editors and affiliations

  • Willy Susilo
    • 1
  • Yi Mu
    • 1
  1. 1.Centre for Computer and Information Security Research, School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-08344-5
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-08343-8
  • Online ISBN 978-3-319-08344-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering