The Australasian Information Security Conference (AISC) 2010 was held on the 19th and 20th January 2010 in Brisbane, Australia, as a part of the Australasian Computer Science Week 2010. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
This year we received 21 submissions from Australia, Brazil, Finland, Japan, Korea, New Zealand, Singapore and United States. After a thorough refereeing process we accepted 10 papers for presentation at AISC 2010. We extend our thanks to all the AISC 2010 authors for their quality submissions and all the members of the Program Committee and additional referees for their expert reviews.
Proceeding Downloads
Information sharing in the 21st century: progress and challenges
With the increasing threat of cyber and other attacks on critical infrastructure, federal governments throughout the world have been organizing industry to share information on possible threats. In Australia the Office of the Attorney General has formed ...
Secure coprocessor-based private information retrieval without periodical preprocessing
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were ...
Reconstruction of falsified computer logs for digital forensics investigations
Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job ...
Advantages and vulnerabilities of pull-based email-delivery
Over the last decade spam has become a serious problem to email-users all over the world. Most of the daily email-traffic consists of this unwanted spam. There are various methods that have been proposed to fight spam, from IP-based blocking to ...
An administrative model for UCONABC
UCONABC is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the ...
Impeding CAPTCHA breakers with visual decryption
Abuse of free Internet resources and services from false account creation, to spam, to identity theft, excessive bandwidth usage, or even vote stuffing online polls is a big problem. The Completely Automatic Public Turing Test to tell Computers and ...
Information security culture: a behaviour compliance conceptual framework
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual ...
Multi-factor password-authenticated key exchange
We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a ...
An analysis of the RC4 family of stream ciphers against algebraic attacks
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on linear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an ...
Certificateless key agreement in the standard model
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by Lippold et al. (2009a) in ICISC 2009 using the Boyd et al. (2008) protocol from ACISP 2008. We introduce the Canetti-...
Combinatorial multicollision attacks on generalized iterated hash functions
We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir. New ...