Advertisement

Information Security and Privacy

23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings

  • Willy Susilo
  • Guomin Yang
Conference proceedings ACISP 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10946)

Also part of the Security and Cryptology book sub series (LNSC, volume 10946)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Foundation

    1. Front Matter
      Pages 1-1
    2. Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu
      Pages 3-12
    3. Yunhua Wen, Shengli Liu
      Pages 13-27
    4. Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
      Pages 28-44
    5. Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
      Pages 64-82
    6. Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
      Pages 101-113
    7. Souradyuti Paul, Ananya Shrivastava
      Pages 114-131
  3. Symmetric-Key Cryptography

    1. Front Matter
      Pages 133-133
    2. Ryoma Ito, Atsuko Miyaji
      Pages 154-171
    3. Nicolas Marrière, Valérie Nachef, Emmanuel Volte
      Pages 188-206
    4. Sumanta Sarkar, Habeeb Syed
      Pages 207-224
  4. Public-Key Cryptography

    1. Front Matter
      Pages 243-243
    2. Xavier Boyen, Thomas Haines
      Pages 245-264
    3. Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu
      Pages 265-283
    4. Shimin Li, Bei Liang, Rui Xue
      Pages 284-303
    5. Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu
      Pages 304-321
    6. Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu
      Pages 322-340
    7. Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe
      Pages 341-359
    8. Xuecheng Ma, Xin Wang, Dongdai Lin
      Pages 360-375
    9. Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang
      Pages 376-395
  5. Cloud Security

    1. Front Matter
      Pages 397-397
    2. Yan Xu, Ran Ding, Jie Cui, Hong Zhong
      Pages 399-416
    3. Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang
      Pages 417-430
    4. Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen et al.
      Pages 431-451
  6. Post-quantum Cryptography

    1. Front Matter
      Pages 453-453
    2. Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan
      Pages 455-466
    3. Jintai Ding, Scott Fluhrer, Saraswathy Rv
      Pages 467-486
    4. Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi
      Pages 487-501
    5. Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu
      Pages 502-519
    6. Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
      Pages 520-538
    7. Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong
      Pages 539-557
    8. Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee et al.
      Pages 558-576
  7. Security Protocol

    1. Front Matter
      Pages 577-577
    2. Handan Kılınç, Serge Vaudenay
      Pages 579-597
    3. Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
      Pages 598-616
  8. System and Network Security

    1. Front Matter
      Pages 617-617
    2. Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin
      Pages 619-633
    3. Yali Zeng, Xu Li, Xu Yang, Qikui Xu, Dongcheng Wang
      Pages 634-648
    4. Jie Cui, Jiantao He, Yan Xu, Hong Zhong
      Pages 649-665
  9. Blockchain and Cryptocurrency

    1. Front Matter
      Pages 667-667
    2. Kexin Hu, Zhenfeng Zhang
      Pages 669-686
    3. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
      Pages 687-705
    4. Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu
      Pages 706-719
    5. Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
      Pages 720-738

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.

The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Keywords

authentication computer crime cryptocurrency cryptography cryptology data mining data privacy digital signature electronic document identification systems encryption privacy preserving public key cryptography public keys (PK) random oracle model secret key semantics software engineering structural design system security wireless telecommunication systems

Editors and affiliations

  1. 1.University of WollongongWollongongAustralia
  2. 2.University of WollongongWollongongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-93638-3
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-93637-6
  • Online ISBN 978-3-319-93638-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site