Skip to main content
  • Conference proceedings
  • © 2002

Information Security and Privacy

7th Australian Conference, ACISP 2002 Melbourne, Australia, July 3-5, 2002 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2384)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2002.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (37 papers)

  1. Front Matter

    Pages I-XII
  2. Key Handling

    1. Security Analysis and Improvement of the Global Key Recovery System

      • Yanjiang Yang, Feng Bao, Robert H. Deng
      Pages 17-24
    2. The LILI-II Keystream Generator

      • A. Clark, Ed Dawson, J. Fuller, J. Golić, H -J. Lee, William Millan et al.
      Pages 25-39
    3. A Secure Re-keying Scheme with Key Recovery Property

      • Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
      Pages 40-55
  3. Trust and Secret Sharing

    1. Modelling Trust Structures for Public Key Infrastructures

      • Marie Henderson, Robert Coulter, Ed Dawson, Eiji Okamoto
      Pages 56-70
    2. Size of Broadcast in Threshold Schemes with Disenrollment

      • S. G. Barwick, W. -A. Jackson, Keith M. Martin, Peter R. Wild
      Pages 71-88
    3. Efficient Sharing of Encrypted Data

      • Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu
      Pages 107-120
    4. Cheating Prevention in Linear Secret Sharing

      • Josef Pieprzyk, Xian-Mo Zhang
      Pages 121-135
  4. Fast Computation

    1. Note on Fast Computation of Secret RSA Exponents

      • Wieland Fischer, Jean-Pierre Seifert
      Pages 136-143
  5. Cryptanalysis I

    1. Cryptanalysis of Stream Cipher COS (2, 128) Mode I

      • Hongjun Wu, Feng Bao
      Pages 154-158
    2. The Analysis of Zheng-Seberry Scheme

      • David Soldera, Jennifer Seberry, Chengxin Qu
      Pages 159-168
    3. Cryptanalysis of Stream Cipher Alpha1

      • Hongjun Wu
      Pages 169-175
  6. AES

    1. Strengthening the Key Schedule of the AES

      • Lauren May, Matt Henricksen, William Millan, Gary Carter, Ed Dawson
      Pages 226-240

Other Volumes

  1. Information Security and Privacy

About this book

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.

Editors and Affiliations

  • Rusden Campus, Deakin University, Melbourne, Australia

    Lynn Batten

  • Department of Computer Science, University of Wollongong, Wollongong, Australia

    Jennifer Seberry

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access