Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2525483dlproceedingsBook PagePublication PagesaiscConference Proceedingsconference-collections
AISC '13: Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
2013 Proceeding
Publisher:
  • Australian Computer Society, Inc.
  • P.O. Box 319 Darlinghurst, NSW 2010
  • Australia
Conference:
Adelaide Australia 29 January 2013- 1 February 2013
ISBN:
978-1-921770-23-4
Published:
29 January 2013

Bibliometrics
Skip Abstract Section
Abstract

The 11th annual meeting of the Australasian Information Security Conference (ACSW-AISC 2013) was held in Adelaide, at the City West Campus of the University of South Australia, as part of the Australasian Computer Science Week, January 29 - February 1, 2013. Originally, our conference was called the Australasian Information Security Workshop. In 2008, it was renamed the Australasian Information Security Conference. The main aim of the ACSW-AISC is to provide a venue for researchers to present their work on all aspects of information security, and to promote collaboration between academic and industrial researchers working in this area.

Skip Table Of Content Section
research-article
Free
Slid pairs in the initialisation of the A5/1 stream cipher
Pages 3–12

A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding ...

research-article
Free
Non-delegatable strong designated verifier signature using a trusted third party without pairings
Pages 13–24

Strong designated verifier signature (SDVS) is characterized by two properties; namely the non-transferability and the privacy of the signer's identity (PSI). Non-transferability prevents anyone else other than the designated verifier to verify the ...

research-article
Free
Cryptanalysis of Brenner et al.'s somewhat homomorphic encryption scheme
Pages 25–30

Recently, Brenner et al. proposed a symmetric somewhat homomorphic encryption scheme and applied it to solve some practical problems, such as the Millionaires' problem, which only need to evaluate circuits of limited depth. It is claimed that the ...

research-article
Free
An overview of the parallax BattleMind v1.5 for computer network defence
Pages 31–37

BattleMind (BM) version 1.5 is the first of a series of Artificial Intelligence systems for semi-automatically understanding, planning and conducting Computer Network Defence. It makes use of a wide range of existing techniques including classification ...

research-article
Free
Digital camcorder forensics
Pages 39–47

Digital camcorders commonly have an in-built capability to export entire video files or a single image to storage media such as a digital versatile disc (DVD). In the event that a DVD is not properly finalised, its contents might not be easily readable. ...

research-article
Free
Anatomy of drive-by download attack
Pages 49–58

Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques ...

research-article
Free
Evaluation of fingerprinting techniques and a windows-based dynamic honeypot
Pages 59–66

Server honeypots are static systems, setup to monitor attacks on research and production networks. Static honeypots are unable to represent the dynamic nature of today's networks where different numbers of hardware devices and hosts running various ...

research-article
Free
Advances in the protection of critical infrastructure by improvement in industrial control system security
Pages 67–73

This paper describes an international research effort that has been working toward identification of vulnerabilities in industrial control systems, mitigation strategies to address vulnerabilities, and development of tools to prevent intrusion on such ...

research-article
A decision and game theoretic approach to networked system security with applications to power grid
Page 77

There has been a growing interest in decision and game theoretic approaches to networked system security as evidenced by the increasing number of publications and conferences such as the Conference on Decision and Game Theory for Security (GameSec). ...

Contributors
  • The University of Auckland
  • University of Melbourne
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

AISC '13 Paper Acceptance Rate 8 of 18 submissions, 44%;
Overall Acceptance Rate 48 of 105 submissions, 46%
YearSubmittedAcceptedRate
AISC '1417741%
AISC '1318844%
AISC '11221045%
AISC '10211048%
AISC '08271348%
Overall1054846%