Information Security and Privacy

8th Australasian Conference, ACISP 2003 Wollongong, Australia, July 9–11, 2003 Proceedings

  • Rei Safavi-Naini
  • Jennifer Seberry
Conference proceedings ACISP 2003

DOI: 10.1007/3-540-45067-X

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2727)

Table of contents (45 papers)

  1. Front Matter
    Pages I-XII
  2. Privacy and Anonymity

    1. Grouping Verifiable Content for Selective Disclosure
      Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng
      Pages 1-12
    2. Evaluation of Anonymity of Practical Anonymous Communication Networks
      Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
      Pages 13-26
    3. An Anonymous Credential System and a Privacy-Aware PKI
      Pino Persiano, Ivan Visconti
      Pages 27-38
    4. Flaws in Some Robust Optimistic Mix-Nets
      Masayuki Abe, Hideki Imai
      Pages 39-50
  3. Invited Talk (I)

  4. Elliptic Curves

    1. The Security of Fixed versus Random Elliptic Curves in Cryptography
      Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson
      Pages 55-66
    2. Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains
      Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu
      Pages 67-78
    3. Generic GF(2m) Arithmetic in Software and Its Application to ECC
      André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz
      Pages 79-92
  5. Crytpanalysis (I)

    1. On the Pseudorandomness of KASUMI Type Permutations
      Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
      Pages 130-141
    2. Theoretical Analysis of η2 Attack on RC6
      Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
      Pages 142-153
  6. Mobile and Network Security

    1. Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach
      Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
      Pages 166-179
    2. Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications
      Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sungwon Sohn
      Pages 180-191
    3. Practical Pay TV Schemes
      Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim
      Pages 192-203
    4. Cooperative Routers against DoS Attacks
      Ha Yoon Song, Han-gyoo Kim
      Pages 204-213
    5. Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs
      Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
      Pages 214-225

About these proceedings



This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003.

The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.


cryptography data security digital information privacy security

Editors and affiliations

  • Rei Safavi-Naini
    • 1
  • Jennifer Seberry
    • 1
  1. 1.School of Information Technology and Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40515-3
  • Online ISBN 978-3-540-45067-2
  • Series Print ISSN 0302-9743