Information Security and Privacy

16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings

  • Udaya Parampalli
  • Philip Hawkes
Conference proceedings ACISP 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6812)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Symmetric Key Cryptography

    1. Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
      Pages 16-33
    2. Phuong Ha Nguyen, Hongjun Wu, Huaxiong Wang
      Pages 61-74
    3. Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
      Pages 75-88
    4. Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri
      Pages 89-105
    5. Andrey Bogdanov, Kyoji Shibutani
      Pages 106-119
    6. Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel
      Pages 120-141
  4. Hash Functions

    1. Juraj Šarinay
      Pages 142-156
    2. Hongbo Yu, Xiaoyun Wang
      Pages 157-171
  5. Protocols

    1. Man Ho Au, Willy Susilo, Yi Mu
      Pages 172-188
    2. Tetsuya Hatano, Atsuko Miyaji, Takashi Sato
      Pages 189-207
    3. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 208-225
  6. Access Control and Security

    1. Benjamin W. Long
      Pages 226-240
    2. Yun Zhang, Christophe Tartary, Huaxiong Wang
      Pages 259-275
    3. Shashank Lagishetty, Pruthvi Sabbu, Kannan Srinathan
      Pages 276-291
  7. Public Key Cryptography

    1. Eduarda S. V. Freire, Kenneth G. Paterson
      Pages 292-309
    2. Yamin Liu, Bao Li, Xianhui Lu, Dingding Jia
      Pages 310-318
    3. Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito
      Pages 319-336
    4. Joseph K. Liu, Cheng Kang Chu, Jianying Zhou
      Pages 337-352
    5. Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
      Pages 353-370
    6. Jia Fan, Yuliang Zheng, Xiaohu Tang
      Pages 371-388
  8. Posters

    1. Reza Sepahi, Ron Steinfeld, Josef Pieprzyk
      Pages 407-411
    2. Craig Wright
      Pages 412-416
    3. Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama
      Pages 417-422
    4. Bart Preneel, Hirotaka Yoshida, Dai Watanabe
      Pages 423-427
    5. Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei
      Pages 428-432
    6. Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling
      Pages 433-438
    7. Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
      Pages 439-443
    8. Christian L. F. Corniaux, Hossein Ghodosi
      Pages 444-450
    9. Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto
      Pages 456-461
  9. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011.
The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.


anonymity cryptanalysis data encryption e-commerce network security

Editors and affiliations

  • Udaya Parampalli
    • 1
  • Philip Hawkes
    • 2
  1. 1.Department of Computer Science and Software EngineeringThe University of MelbourneVictoriaAustralia
  2. 2.Qualcomm IncorporatedSydneyAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-22496-6
  • Online ISBN 978-3-642-22497-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site