Skip to main content
  • Conference proceedings
  • © 2016

Information Security and Privacy

21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9722)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

    Pages I-XVIII
  2. Invited Papers

    1. Front Matter

      Pages 1-1
    2. I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing

      • Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu et al.
      Pages 3-19
    3. MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services

      • Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang
      Pages 20-39
    4. A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids

      • Jingxuan Wang, Lucas C. K. Hui, S. M. Yiu, Xingmin Cui, Eric Ke Wang, Junbin Fang
      Pages 40-56
    5. Towards Bitcoin Payment Networks

      • Patrick McCorry, Malte Möser, Siamak F. Shahandasti, Feng Hao
      Pages 57-76
    6. Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models

      • Min Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh, Wun-She Yap
      Pages 77-93
    7. Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes

      • Zhe Liu, Johann Großschädl, Lin Li, Qiuliang Xu
      Pages 94-112
  3. National Security Infrastructure

    1. Front Matter

      Pages 113-113
    2. On the Guessability of Resident Registration Numbers in South Korea

      • Youngbae Song, Hyoungshick Kim, Jun Ho Huh
      Pages 128-138
  4. Social Network Security

    1. Front Matter

      Pages 139-139
  5. Bitcoin Security

    1. Front Matter

      Pages 159-159
    2. Fair Client Puzzles from the Bitcoin Blockchain

      • Colin Boyd, Christopher Carr
      Pages 161-177
  6. Statistical Privacy

    1. Front Matter

      Pages 179-179
    2. Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database

      • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
      Pages 181-197
  7. Network Security

    1. Front Matter

      Pages 213-213

Other Volumes

  1. Information Security and Privacy

About this book

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

Editors and Affiliations

  • Monash University, Melbourne, Australia

    Joseph K. Liu, Ron Steinfeld

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access