Information Security and Privacy

9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings

  • Huaxiong Wang
  • Josef Pieprzyk
  • Vijay Varadharajan
Conference proceedings ACISP 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3108)

Table of contents

  1. Front Matter
  2. Broadcast Encryption and Traitor Tracing

    1. Shaoquan Jiang, Guang Gong
      Pages 1-11
    2. Vu Dong Tô, Reihaneh Safavi-Naini
      Pages 24-35
    3. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
      Pages 36-49
  3. Private Information Retrieval and Oblivious Transfer

    1. Goichiro Hanaoka, Hideki Imai, Joern Mueller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
      Pages 62-73
  4. Trust and Secret Sharing

    1. Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli
      Pages 86-97
  5. Cryptanalysis (I)

    1. Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
      Pages 98-109
    2. Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee
      Pages 110-122
    3. Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
      Pages 123-136
    4. Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee
      Pages 137-148
  6. Cryptanalysis (II)

  7. Digital Signatures (I)

    1. Dae Hyun Yum, Pil Joong Lee
      Pages 200-211
  8. Cryptosystems (I)

    1. Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
      Pages 212-223
    2. Tetsu Iwata, Kaoru Kurosawa
      Pages 224-235
    3. Kaoru Kurosawa, Toshihiko Matsuo
      Pages 236-247
    4. Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum
      Pages 248-261
  9. Fast Computation

  10. Mobile Agents Security

    1. Ming Yao, Matt Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
      Pages 301-312
  11. Digital Signatures (II)

    1. Willy Susilo, Fangguo Zhang, Yi Mu
      Pages 313-324
    2. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 325-335
    3. Zhenjie Huang, Yumin Wang
      Pages 348-357
  12. Protocols

    1. Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
      Pages 358-369
    2. Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
      Pages 370-378
    3. SungJun Min, Go Yamamoto, Kwangjo Kim
      Pages 379-390
  13. Security Management

  14. Access Control and Authorisation

    1. Xi-Bin Zhao, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun
      Pages 414-426
  15. Cryptosystems (II)

    1. Luke McAven, Rei Safavi-Naini, Moti Yung
      Pages 427-439
    2. Erik Anderson, Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
      Pages 440-453
  16. Cryptanalysis (III)

    1. Dong-Guk Han, Jongin Lim, Kouichi Sakurai
      Pages 454-465
    2. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
      Pages 466-477
    3. Christophe Giraud, Erik W. Knudsen
      Pages 478-491
  17. Back Matter

About these proceedings


The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The - viewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, ?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication.


Code Information Resolution Signatur authentication cryptography cryptology data security distributed computing identity information security privacy security systems security trust

Editors and affiliations

  • Huaxiong Wang
    • 1
  • Josef Pieprzyk
    • 2
  • Vijay Varadharajan
    • 3
  1. 1.Centre for Advanced Computing - Algorithms and Cryptography Department of ComputingMacquarie UniversityAustralia
  2. 2.Department of ComputingMacquarie UniversitySydneyAustralia
  3. 3.Macquarie UniversitySydneyAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22379-5
  • Online ISBN 978-3-540-27800-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site