Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1862266dlproceedingsBook PagePublication PagesaiscConference Proceedingsconference-collections
AISC '10: Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
2010 Proceeding
Publisher:
  • Australian Computer Society, Inc.
  • P.O. Box 319 Darlinghurst, NSW 2010
  • Australia
Conference:
Brisbane Australia 1 January 2010
ISBN:
978-1-920682-86-6
Published:
01 January 2010
Sponsors:
Australian Comp Soc, SAP Research, Queensland University of Technology, CEED, CSIRO ICT Centre, CORE - Computing Research and Education, QUT Information Security Institute

Reflects downloads up to 17 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

The Australasian Information Security Conference (AISC) 2010 was held on the 19th and 20th January 2010 in Brisbane, Australia, as a part of the Australasian Computer Science Week 2010. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.

This year we received 21 submissions from Australia, Brazil, Finland, Japan, Korea, New Zealand, Singapore and United States. After a thorough refereeing process we accepted 10 papers for presentation at AISC 2010. We extend our thanks to all the AISC 2010 authors for their quality submissions and all the members of the Program Committee and additional referees for their expert reviews.

Skip Table Of Content Section
SESSION: Keynote talk
research-article
Information sharing in the 21st century: progress and challenges
Page 2

With the increasing threat of cyber and other attacks on critical infrastructure, federal governments throughout the world have been organizing industry to share information on possible threats. In Australia the Office of the Attorney General has formed ...

SESSION: Contributed papers
research-article
Free
Secure coprocessor-based private information retrieval without periodical preprocessing
Pages 5–11

Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were ...

research-article
Free
Reconstruction of falsified computer logs for digital forensics investigations
Pages 12–21

Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job ...

research-article
Free
Advantages and vulnerabilities of pull-based email-delivery
Pages 22–31

Over the last decade spam has become a serious problem to email-users all over the world. Most of the daily email-traffic consists of this unwanted spam. There are various methods that have been proposed to fight spam, from IP-based blocking to ...

research-article
Free
An administrative model for UCONABC
Pages 32–38

UCONABC is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the ...

research-article
Free
Impeding CAPTCHA breakers with visual decryption
Pages 39–46

Abuse of free Internet resources and services from false account creation, to spam, to identity theft, excessive bandwidth usage, or even vote stuffing online polls is a big problem. The Completely Automatic Public Turing Test to tell Computers and ...

research-article
Free
Information security culture: a behaviour compliance conceptual framework
Pages 47–55

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual ...

research-article
Free
Multi-factor password-authenticated key exchange
Pages 56–66

We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a ...

research-article
Free
An analysis of the RC4 family of stream ciphers against algebraic attacks
Pages 67–74

To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on linear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an ...

research-article
Free
Certificateless key agreement in the standard model
Pages 75–85

We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by Lippold et al. (2009a) in ICISC 2009 using the Boyd et al. (2008) protocol from ACISP 2008. We introduce the Canetti-...

research-article
Free
Combinatorial multicollision attacks on generalized iterated hash functions
Pages 86–93

We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir. New ...

Contributors
  • Norwegian University of Science and Technology
  • University of Wollongong

Recommendations

Acceptance Rates

AISC '10 Paper Acceptance Rate 10 of 21 submissions, 48%;
Overall Acceptance Rate 48 of 105 submissions, 46%
YearSubmittedAcceptedRate
AISC '1417741%
AISC '1318844%
AISC '11221045%
AISC '10211048%
AISC '08271348%
Overall1054846%