default search action
Search dblp for Publications
export results for "stream:conf/auisc:"
@inproceedings{DBLP:conf/auisc/DiSBDW15, author = {Binbin Di and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Ian Welch and Xun Yi}, title = {Correcting flaws in Mitchell's analysis of {EPBC}}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {57--60}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Di.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/DiSBDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/HerreraC15, author = {Adrian Herrera and Ben Cheney}, editor = {Ian Welch and Xun Yi}, title = {{JMD:} {A} Hybrid Approach for Detecting Java Malware}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {3--13}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Herrera.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/HerreraC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/JayarathnaTV15, author = {Dilshan Jayarathna and Udaya Kiran Tupakula and Vijay Varadharajan}, editor = {Ian Welch and Xun Yi}, title = {Hypervisor-based Security Architecture to Protect Web Applications}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {15--24}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Jayarathna.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/JayarathnaTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/ManiHCM15, author = {Deepa Mani and Alireza Heravi and Kim{-}Kwang Raymond Choo and Sameera Mubarak}, editor = {Ian Welch and Xun Yi}, title = {Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {53--56}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Mani.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/ManiHCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MyersFR15, author = {David Myers and Ernest Foo and Kenneth Radke}, editor = {Ian Welch and Xun Yi}, title = {Internet-wide Scanning Taxonomy and Framework}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {61--65}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Myers.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MyersFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/NewbyGMOMN15, author = {Tristan Newby and Duncan A. Grove and Alex Murray and Chris A. Owen and Jim McCarthy and Chris J. North}, editor = {Ian Welch and Xun Yi}, title = {Annex: {A} Middleware for Constructing High-Assurance Software Systems}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {25--34}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Newby.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/NewbyGMOMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RicherNO15, author = {Toby J. Richer and Grant Neale and Grant Osborne}, editor = {Ian Welch and Xun Yi}, title = {On the {E} ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {35--44}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Richer.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RicherNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RodofileRF15, author = {Nicholas R. Rodofile and Kenneth Radke and Ernest Foo}, editor = {Ian Welch and Xun Yi}, title = {Real-Time and Interactive Attacks on {DNP3} Critical Infrastructure Using Scapy}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {67--70}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Rodofile.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RodofileRF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/ShieldHBN15, author = {John Shield and Bradley D. Hopkins and Mark R. Beaumont and Chris North}, editor = {Ian Welch and Xun Yi}, title = {Hardware Trojans - {A} Systemic Threat}, booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, pages = {45--51}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Shield.html}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/ShieldHBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2015, editor = {Ian Welch and Xun Yi}, title = {13th Australasian Information Security Conference, {AISC} 2015, Sydney, Australia, January 2015}, series = {{CRPIT}}, volume = {161}, publisher = {Australian Computer Society}, year = {2015}, url = {http://crpit.scem.westernsydney.edu.au/Vol161.html}, isbn = {978-1-921770-43-2}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Al-HamdanBDSW14, author = {Ali Al{-}Hamdan and Harry Bartlett and Ed Dawson and Leonie Simpson and Kenneth Koon{-}Ho Wong}, editor = {Udaya Parampalli and Ian Welch}, title = {Weak key-IV Pairs in the {A5/1} Stream Cipher}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {23--36}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Alhamdan.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Al-HamdanBDSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/BajajP14, author = {Kamini Bajaj and Josef Pieprzyk}, editor = {Udaya Parampalli and Ian Welch}, title = {A Case Study of User-Level Spam Filtering}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {67--75}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Bajaj.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/BajajP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/BhatiaKDAF14, author = {Sajal Bhatia and Nishchal Kush and Chris I. Djamaludin and Ayodeji James Akande and Ernest Foo}, editor = {Udaya Parampalli and Ian Welch}, title = {Practical Modbus Flooding Attack and Detection}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {57--65}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Bhatia.html}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/BhatiaKDAF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/JayarathnaTV14, author = {Dilshan Jayarathna and Udaya Kiran Tupakula and Vijay Varadharajan}, editor = {Udaya Parampalli and Ian Welch}, title = {Hypervisor-based Security Architecture for Validating {DNS} Services (Poster)}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {83--86}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Jayarathna.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/JayarathnaTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/KushABF14, author = {Nishchal Kush and Ejaz Ahmed and Mark Branagan and Ernest Foo}, editor = {Udaya Parampalli and Ian Welch}, title = {Poisoned {GOOSE:} Exploiting the {GOOSE} Protocol}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {17--22}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Kush.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/KushABF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MansooriWF14, author = {Masood Mansoori and Ian Welch and Qiang Fu}, editor = {Udaya Parampalli and Ian Welch}, title = {YALIH, Yet Another Low Interaction Honeyclient}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {7--15}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Mansoori.html}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MansooriWF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNMS14, author = {Kenneth Radke and Colin Boyd and Juanma Gonz{\'{a}}lez Nieto and Mark Manulis and Douglas Stebila}, editor = {Udaya Parampalli and Ian Welch}, title = {Formalising Human Recognition: a Fundamental Building Block for Security Proofs}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {37--45}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SeneviratnePK14, author = {Janaka Seneviratne and Udaya Parampalli and Lars Kulik}, editor = {Udaya Parampalli and Ian Welch}, title = {An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {47--56}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Seneviratne.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SeneviratnePK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/TeoWBSD14, author = {Sui{-}Guan Teo and Kenneth Koon{-}Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson}, editor = {Udaya Parampalli and Ian Welch}, title = {Algebraic analysis of Trivium-like ciphers (Poster)}, booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, pages = {77--81}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Teo.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/TeoWBSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2014, editor = {Udaya Parampalli and Ian Welch}, title = {Twelfth Australasian Information Security Conference, {AISC} 2014, Auckland, New Zealand, January 2014}, series = {{CRPIT}}, volume = {149}, publisher = {Australian Computer Society}, year = {2014}, url = {http://crpit.scem.westernsydney.edu.au/Vol149.html}, isbn = {978-1-921770-32-6}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Al-HamdanBDSW13, author = {Ali Al{-}Hamdan and Harry Bartlett and Ed Dawson and Leonie Simpson and Kenneth Koon{-}Ho Wong}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Slid Pairs in the Initialisation of the {A5/1} Stream Cipher}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {3--12}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Alhamdan.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Al-HamdanBDSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Alpcan13, author = {Tansu Alpcan}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture)}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {77--78}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Alpcan.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Alpcan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AriffinCS13, author = {Aswami Ariffin and Kim{-}Kwang Raymond Choo and Jill Slay}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Digital Camcorder Forensics}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {39--48}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Ariffin.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AriffinCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AsaarVS13, author = {Maryam Rajabzadeh Asaar and Ali Vardasbi and Mahmoud Salmasizadeh}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {13--25}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Asaar.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AsaarVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/GroveMGTTM13, author = {Duncan A. Grove and Alex Murray and Damien Gerhardy and Benjamin P. Turnbull and Troy Tobin and Christopher Moir}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {An Overview of the Parallax BattleMind v1.5 for Computer Network Defence}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {31--38}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Grove.html}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/GroveMGTTM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeWGK13, author = {Van Lam Le and Ian Welch and Xiaoying Gao and Peter Komisarczuk}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Anatomy of Drive-by Download Attack}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {49--58}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Le.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LeWGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MohammadzadehMW13, author = {Hadi Mohammadzadeh and Masood Mansoori and Ian Welch}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {59--66}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Mohammadzadeh.html}, timestamp = {Mon, 12 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MohammadzadehMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MorrisVS13, author = {Thomas H. Morris and Rayford B. Vaughn and Elena Sitnikova}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {67--76}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Morris.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MorrisVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/PauletY13, author = {Russell Paulet and Xun Yi}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {25--30}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Paulet.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/PauletY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2013, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/Vol138.html}, isbn = {978-1-921770-23-4}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Al-HamdanBSDW12, author = {Ali Al{-}Hamdan and Harry Bartlett and Leonie Simpson and Ed Dawson and Kenneth Koon{-}Ho Wong}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {State convergence in the initialisation of the Sfinks stream cipher}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {27--32}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Alhamdan.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Al-HamdanBSDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/DobleFC12, author = {Christopher Doble and Colin J. Fidge and Diane Corney}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Data Flow Analysis of Embedded Program Expressions}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {71--82}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Doble.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/DobleFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/HauserTRF12, author = {Christophe Hauser and Fr{\'{e}}d{\'{e}}ric Tronel and Jason Reid and Colin J. Fidge}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {A taint marking approach to confidentiality violation detection}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {83--90}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Hauser.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/HauserTRF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeeNB12, author = {Kaleb Lee and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Improving the Efficiency of {RFID} Authentication with Pre-Computation}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {91--100}, publisher = {Australian Computer Society}, year = {2012}, timestamp = {Fri, 01 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/LeeNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeePN12, author = {Peter Hyun{-}Jeen Lee and Udaya Parampalli and Shivaramakrishnan Narayan}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {E cient Identity-based Signcryption without Random Oracles}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {3--14}, publisher = {Australian Computer Society}, year = {2012}, timestamp = {Fri, 01 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/LeePN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MillsFC12, author = {Chris Mills and Colin J. Fidge and Diane Corney}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {59--70}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Mills.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MillsFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/OrumiehchihaPS12, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Cryptanalysis of RC4-Based Hash Function}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {33--38}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Orumiehchiha.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/OrumiehchihaPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RadkeBNB12, author = {Kenneth Radke and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Margot Brereton}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Towards a Secure Human-and-Computer Mutual Authentication Protocol}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {39--46}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Radke.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RadkeBNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SeifiSFB12, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Analysis of Object-Specific Authorization Protocol {(OSAP)} using Coloured Petri Nets}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {47--58}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Seifi.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SeifiSFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Suppakitpaisarn12, author = {Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {15--26}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Suppakitpaisarn.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Suppakitpaisarn12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2012, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/Vol125.html}, isbn = {978-1-921770-06-7}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AgnesseP11, author = {Andrea Agnesse and Marco Pedicini}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Cube Attack in Finite Fields of Higher Order}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {9--14}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Agnesse.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AgnesseP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/BaiK11, author = {Yun Bai and Khaled M. Khan}, editor = {Colin Boyd and Josef Pieprzyk}, title = {A Modal Logic for Information System Security}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {51--56}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Bai.html}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/BaiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/CampbellCL11, author = {Scott Campbell and Steve Chan and Jason Lee}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Detection of Fast Flux Service Networks}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {57--66}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Campbell.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/CampbellCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/CorneyMC11, author = {Malcolm Corney and George M. Mohay and Andrew J. Clark}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Detection of Anomalies from User Profiles Generated from System Logs}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {23--32}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Corney.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/CorneyMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/KaosarPY11, author = {Md. Golam Kaosar and Russell Paulet and Xun Yi}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Secure Two-Party Association Rule Mining}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {15--22}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Kaosar.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/KaosarPY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LacknerT11, author = {G{\"{u}}nther Lackner and Peter Teufl}, editor = {Colin Boyd and Josef Pieprzyk}, title = {{IEEE} 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {41--50}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Lackner.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LacknerT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LeWGK11, author = {Van Lam Le and Ian Welch and Xiaoying Gao and Peter Komisarczuk}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Identification of Potential Malicious Web Pages}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {33--40}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Le.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LeWGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/NakamuraIBIY11, author = {Toru Nakamura and Shunsuke Inenaga and Kensuke Baba and Daisuke Ikeda and Hiroto Yasuura}, editor = {Colin Boyd and Josef Pieprzyk}, title = {An Anonymous Authentication Protocol with Single-database {PIR}}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {3--8}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Nakamura.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/NakamuraIBIY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/PalmerBW11, author = {Ben Palmer and Kris Bubendorfer and Ian Welch}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {67--76}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Palmer.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/PalmerBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RiesSP11, author = {Thorsten Ries and Radu State and Andriy Panchenko}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {77--86}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Ries.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RiesSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2011, editor = {Colin Boyd and Josef Pieprzyk}, title = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/Vol116.html}, isbn = {978-1-920682-96-5}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AlfawazNM10, author = {Salahuddin Alfawaz and Karen Nelson and Kavoos Mohannak}, editor = {Colin Boyd and Willy Susilo}, title = {Information security culture: {A} Behaviour Compliance Conceptual Framework}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {47--55}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Alfawaz.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AlfawazNM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/ChrobokTO10, author = {Natascha Chrobok and Andrew Trotman and Richard A. O'Keefe}, editor = {Colin Boyd and Willy Susilo}, title = {Advantages and vulnerabilities of pull-based email-delivery}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {22--31}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Chrobok.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/ChrobokTO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/DawsonRSB10, author = {Ed Dawson and Jason Reid and Farzad Salim and Mark Burdon}, editor = {Colin Boyd and Willy Susilo}, title = {Information Sharing in the 21st century: Progress and Challenges}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {2}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Dawson.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/DawsonRSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/HalunenKK10, author = {Kimmo Halunen and Juha Kortelainen and Tuomas Kortelainen}, editor = {Colin Boyd and Willy Susilo}, title = {Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {86--93}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Halunen.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/HalunenKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LangW10, author = {Simon R. Lang and Neville I. Williams}, editor = {Colin Boyd and Willy Susilo}, title = {Impeding {CAPTCHA} Breakers with Visual Decryption}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {39--46}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Lang.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LippoldN10, author = {Georg Lippold and Juanma Gonz{\'{a}}lez Nieto}, editor = {Colin Boyd and Willy Susilo}, title = {Certificateless Key Agreement in the Standard Model}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {75--85}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Lippold.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LippoldN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SalimRD10, author = {Farzad Salim and Jason Reid and Ed Dawson}, editor = {Colin Boyd and Willy Susilo}, title = {An Administrative Model for {UCON} {ABC}}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {32--38}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Salim.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SalimRD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/StebilaUS10, author = {Douglas Stebila and Poornaprajna Udupi and Sheueling Chang Shantz}, editor = {Colin Boyd and Willy Susilo}, title = {Multi-Factor Password-Authenticated Key Exchange}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {56--66}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Stebila.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/StebilaUS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/TangF10, author = {Maolin Tang and Colin J. Fidge}, editor = {Colin Boyd and Willy Susilo}, title = {Reconstruction of Falsified Computer Logs for Digital Forensics Investigations}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {12--21}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Tang.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/TangF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/WangWP10, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Colin Boyd and Willy Susilo}, title = {Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {5--11}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Wang.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/WangWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/WongCD10, author = {Kenneth Koon{-}Ho Wong and Gary Carter and Ed Dawson}, editor = {Colin Boyd and Willy Susilo}, title = {An Analysis of the {RC4} Family of Stream Ciphers against Algebraic Attacks}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {67--74}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Wong.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/WongCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2010, editor = {Colin Boyd and Willy Susilo}, title = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/Vol105.html}, isbn = {978-1-920682-86-6}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Alcalde0MMR09, author = {Baptiste Alcalde and Eric Dubois and Sjouke Mauw and Nicolas Mayer and Sasa Radomirovic}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Towards a Decision Model Based on Trust and Security Risk Management}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {61--69}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Alcalde.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Alcalde0MMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AraiT09, author = {Masato Arai and Hidehiko Tanaka}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {89--98}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Arai.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AraiT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/FusenigSSE09, author = {Volker Fusenig and Eugen Staab and Uli Sorger and Thomas Engel}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Slotted Packet Counting Attacks on Anonymity Protocols}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {53--59}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Fusenig.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/FusenigSSE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/GorantlaBN09, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Strong Designated Verifier Signature in a Multi-user Setting}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {21--31}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Gorantla.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/GorantlaBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/HisilWCD09, author = {H{\"{u}}seyin Hisil and Kenneth Koon{-}Ho Wong and Gary Carter and Ed Dawson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Faster Group Operations on Elliptic Curves}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {7--19}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Hisil.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/HisilWCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/LiuFCMS09, author = {Vicky Liu and Luis Franco and William J. Caelli and Lauren May and Tony Sahama}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Open and Trusted Information Systems/Health Informatics Access Control {(OTHIS/HIAC)}}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {99--108}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Liu.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/LiuFCMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/NotoatmodjoT09, author = {Gilbert Notoatmodjo and Clark D. Thomborson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Passwords and Perceptions}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {71--78}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Notoatmodjo.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/NotoatmodjoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/TeradaU09, author = {Routo Terada and Eduardo T. Ueda}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {A New Version of the {RC6} Algorithm, Stronger against {\(\chi\)}\({}^{\mbox{2}}\) Cryptanalysis}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {47--52}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Terada.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/TeradaU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Thomborson09, author = {Clark D. Thomborson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Foundation for Systems Security}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {3}, publisher = {Australian Computer Society}, year = {2009}, timestamp = {Thu, 28 Jan 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/auisc/Thomborson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/TuT09, author = {Yu{-}Cheng Tu and Clark D. Thomborson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Preliminary Security Specification for New Zealand's igovt System}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {79--88}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Tu.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/TuT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/ZabaRSDHW09, author = {Muhammad Reza Z'aba and H{\aa}vard Raddum and Leonie Simpson and Ed Dawson and Matt Henricksen and Kenneth Koon{-}Ho Wong}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Algebraic Analysis of {LEX}}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {33--45}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98RezaZaba.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/ZabaRSDHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2009, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/Vol98.html}, isbn = {978-1-920682-79-8}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AlzaidFN08, author = {Hani Alzaid and Ernest Foo and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Secure Data Aggregation in Wireless Sensor Network: a survey}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {93--105}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Alzaid.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AlzaidFN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Deploying Access Control in Distributed Workflow}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {9--17}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ayed.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/BihamS08, author = {Eli Biham and Jennifer Seberry}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {A New Very Fast Stream Cipher : Tpy}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {5}, publisher = {Australian Computer Society}, year = {2008}, timestamp = {Mon, 06 Jul 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/BihamS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Caballero-Gil08, author = {Pino Caballero{-}Gil}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Current Topics in Security of Mobile Ad-hoc NETworks}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {3}, publisher = {Australian Computer Society}, year = {2008}, timestamp = {Mon, 06 Jul 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Caballero-Gil08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/FusenigSE08, author = {Volker Fusenig and Dagmara Spiewak and Thomas Engel}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Acimn: {A} protocol for Anonymous Communication In Multi hop wireless networks}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {107--114}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Fusenig.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/FusenigSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Fuster-SabaterC08, author = {Amparo F{\'{u}}ster{-}Sabater and Pino Caballero{-}Gil}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {47--52}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81FusterSabater.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Fuster-SabaterC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/GorantlaBN08, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {ID-based One-pass Authenticated Key Establishment}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {39--46}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Gorantla.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/GorantlaBN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/JosangA08, author = {Audun J{\o}sang and Bander AlFayyadh}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Robust {WYSIWYS:} {A} Method for Ensuring that What You See Is What You Sign}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {53--58}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Josang.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/JosangA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MurrayG08, author = {Alex Murray and Duncan A. Grove}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {{PULSE:} a Pluggable User-space Linux Security Environment paper}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {19--25}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Murray.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MurrayG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Pasupathinathan08, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Formal Security Analysis of Australian E-passport Implementation}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {75--82}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Vijayakrishnan.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Pasupathinathan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/PhamRMD08, author = {Quan Pham and Jason Reid and Adrian McCullagh and Ed Dawson}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Commitment Issues in Delegation Process}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {27--38}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Pham.html}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/PhamRMD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/RenMS08, author = {Qiong Ren and Yi Mu and Willy Susilo}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Mitigating Phishing with ID-based Online/Offline Authentication}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {59--64}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ren.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/RenMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SuriadiFD08, author = {Suriadi Suriadi and Ernest Foo and Rong Du}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Layered Identity Infrastructure Model for Identity Meta Systems}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {83--92}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Suriadi.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SuriadiFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Wiander08, author = {Timo Wiander}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Implementing the {ISO/IEC} 17799 standard in practice - experiences on audit phases}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {115--119}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Wiander.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Wiander08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/ZomaiAJM08, author = {Mohammed Al Zomai and Bander AlFayyadh and Audun J{\o}sang and Adrian McCullagh}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {65--73}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81AlZomai.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/ZomaiAJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2008, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/Vol81.html}, isbn = {978-1-920682-62-0}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.