Information Security and Privacy

9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings

  • Huaxiong Wang
  • Josef Pieprzyk
  • Vijay Varadharajan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3108)

Table of contents

  1. Front Matter
  2. Broadcast Encryption and Traitor Tracing

    1. Shaoquan Jiang, Guang Gong
      Pages 1-11
    2. Vu Dong Tô, Reihaneh Safavi-Naini
      Pages 24-35
    3. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
      Pages 36-49
  3. Private Information Retrieval and Oblivious Transfer

    1. Goichiro Hanaoka, Hideki Imai, Joern Mueller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
      Pages 62-73
  4. Trust and Secret Sharing

    1. Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli
      Pages 86-97
  5. Cryptanalysis (I)

    1. Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
      Pages 98-109
    2. Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee
      Pages 110-122
    3. Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
      Pages 123-136
    4. Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee
      Pages 137-148
  6. Cryptanalysis (II)

  7. Digital Signatures (I)

    1. Dae Hyun Yum, Pil Joong Lee
      Pages 200-211
  8. Cryptosystems (I)

    1. Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
      Pages 212-223

About these proceedings

Introduction

The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The - viewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, ?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication.

Keywords

Code Information Resolution Signatur authentication cryptography cryptology data security distributed computing identity information security privacy security systems security trust

Editors and affiliations

  • Huaxiong Wang
    • 1
  • Josef Pieprzyk
    • 2
  • Vijay Varadharajan
    • 3
  1. 1.Centre for Advanced Computing - Algorithms and Cryptography Department of ComputingMacquarie UniversityAustralia
  2. 2.Department of ComputingMacquarie UniversitySydneyAustralia
  3. 3.Macquarie UniversitySydneyAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/b98755
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22379-5
  • Online ISBN 978-3-540-27800-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349