Information Security and Privacy

13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

  • Editors
  • Yi Mu
  • Willy Susilo
  • Jennifer Seberry
Conference proceedings ACISP 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5107)

Table of contents

  1. Front Matter
  2. Xavier Boyen
    Pages 1-5
  3. Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa
    Pages 21-36
  4. Jiayuan Sui, Douglas R. Stinson
    Pages 37-52
  5. Alfred Menezes, Berkant Ustaoglu
    Pages 53-68
  6. Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson
    Pages 69-83
  7. Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo
    Pages 84-97
  8. Takato Hirano, Koichiro Wada, Keisuke Tanaka
    Pages 98-112
  9. Jacek Cichoń, Marek Klonowski, Mirosław Kutyłowski
    Pages 128-140
  10. Huafei Zhu
    Pages 141-154
  11. Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang
    Pages 155-169
  12. Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan
    Pages 170-186
  13. Debra L. Cook, Moti Yung, Angelos D. Keromytis
    Pages 187-202
  14. Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
    Pages 203-215
  15. Lei Zhang, Wentao Zhang, Wenling Wu
    Pages 216-229
  16. Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
    Pages 230-238
  17. Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin
    Pages 239-253
  18. Somitra Kumar Sanadhya, Palash Sarkar
    Pages 254-266

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.

The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.

Keywords

anonymity biometrics block ciphers classifier cryptanalysis cryptographic hash function cryptographic protocols cryptography cryptosystems data security digital signature schemes distributed system elliptic curve cryptography encryption faul

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-70500-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-69971-2
  • Online ISBN 978-3-540-70500-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book