Information Security and Privacy

8th Australasian Conference, ACISP 2003 Wollongong, Australia, July 9–11, 2003 Proceedings

  • Rei Safavi-Naini
  • Jennifer Seberry
Conference proceedings ACISP 2003

DOI: 10.1007/3-540-45067-X

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2727)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Privacy and Anonymity

    1. Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng
      Pages 1-12
    2. Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
      Pages 13-26
    3. Pino Persiano, Ivan Visconti
      Pages 27-38
    4. Masayuki Abe, Hideki Imai
      Pages 39-50
  3. Invited Talk (I)

  4. Elliptic Curves

    1. Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
      Pages 55-66
    2. Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu
      Pages 67-78
    3. André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz
      Pages 79-92
  5. Crytpanalysis (I)

    1. Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
      Pages 130-141
    2. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
      Pages 142-153
  6. Mobile and Network Security

    1. Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
      Pages 166-179
    2. Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sungwon Sohn
      Pages 180-191
    3. Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim
      Pages 192-203
    4. Ha Yoon Song, Han-gyoo Kim
      Pages 204-213
    5. Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
      Pages 214-225

About these proceedings

Introduction

 

This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003.

The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.

Keywords

cryptography data security digital information privacy security

Editors and affiliations

  • Rei Safavi-Naini
    • 1
  • Jennifer Seberry
    • 1
  1. 1.School of Information Technology and Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40515-3
  • Online ISBN 978-3-540-45067-2
  • Series Print ISSN 0302-9743