Information Security and Privacy

16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings

  • Udaya Parampalli
  • Philip Hawkes
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6812)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Symmetric Key Cryptography

    1. Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
      Pages 16-33
    2. Phuong Ha Nguyen, Hongjun Wu, Huaxiong Wang
      Pages 61-74
    3. Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
      Pages 75-88
    4. Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri
      Pages 89-105
    5. Andrey Bogdanov, Kyoji Shibutani
      Pages 106-119
    6. Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel
      Pages 120-141
  4. Hash Functions

    1. Juraj Šarinay
      Pages 142-156
    2. Hongbo Yu, Xiaoyun Wang
      Pages 157-171
  5. Protocols

    1. Man Ho Au, Willy Susilo, Yi Mu
      Pages 172-188
    2. Tetsuya Hatano, Atsuko Miyaji, Takashi Sato
      Pages 189-207
    3. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 208-225
  6. Access Control and Security

    1. Benjamin W. Long
      Pages 226-240
    2. Yun Zhang, Christophe Tartary, Huaxiong Wang
      Pages 259-275
    3. Shashank Lagishetty, Pruthvi Sabbu, Kannan Srinathan
      Pages 276-291
  7. Public Key Cryptography

    1. Eduarda S. V. Freire, Kenneth G. Paterson
      Pages 292-309

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011.
The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Keywords

anonymity cryptanalysis data encryption e-commerce network security

Editors and affiliations

  • Udaya Parampalli
    • 1
  • Philip Hawkes
    • 2
  1. 1.Department of Computer Science and Software EngineeringThe University of MelbourneVictoriaAustralia
  2. 2.Qualcomm IncorporatedSydneyAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-22497-3
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-22496-6
  • Online ISBN 978-3-642-22497-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349