:facetid:toc:\"db/conf/auisc/auisc2008.bht\"OK:facetid:toc:db/conf/auisc/auisc2008.bhtHani AlzaidErnest FooJuan Manuel González NietoSecure Data Aggregation in Wireless Sensor Network: a survey.AISC93-1052008Conference and Workshop Papersclosedconf/auisc/AlzaidFN08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Alzaid.htmlhttps://dblp.org/rec/conf/auisc/AlzaidFN08URL#5322114Samiha AyedNora Cuppens-BoulahiaFrédéric CuppensDeploying Access Control in Distributed Workflow.AISC9-172008Conference and Workshop Papersclosedconf/auisc/AyedCC08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ayed.htmlhttps://dblp.org/rec/conf/auisc/AyedCC08URL#5322115Eli BihamJennifer SeberryA New Very Fast Stream Cipher : Tpy.AISC52008Conference and Workshop Papersunavailableconf/auisc/BihamS08https://dblp.org/rec/conf/auisc/BihamS08URL#5322116Pino Caballero-GilCurrent Topics in Security of Mobile Ad-hoc NETworks.AISC32008Conference and Workshop Papersunavailableconf/auisc/Caballero-Gil08https://dblp.org/rec/conf/auisc/Caballero-Gil08URL#5322117Volker FusenigDagmara SpiewakThomas Engel 0001Acimn: A protocol for Anonymous Communication In Multi hop wireless networks.AISC107-1142008Conference and Workshop Papersclosedconf/auisc/FusenigSE08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Fusenig.htmlhttps://dblp.org/rec/conf/auisc/FusenigSE08URL#5322118Amparo Fúster-SabaterPino Caballero-GilLinear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.AISC47-522008Conference and Workshop Papersclosedconf/auisc/Fuster-SabaterC08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81FusterSabater.htmlhttps://dblp.org/rec/conf/auisc/Fuster-SabaterC08URL#5322119M. Choudary GorantlaColin BoydJuan Manuel González NietoID-based One-pass Authenticated Key Establishment.AISC39-462008Conference and Workshop Papersclosedconf/auisc/GorantlaBN08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Gorantla.htmlhttps://dblp.org/rec/conf/auisc/GorantlaBN08URL#5322120Audun JøsangBander AlFayyadhRobust WYSIWYS: A Method for Ensuring that What You See Is What You Sign.AISC53-582008Conference and Workshop Papersclosedconf/auisc/JosangA08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Josang.htmlhttps://dblp.org/rec/conf/auisc/JosangA08URL#5322121Alex MurrayDuncan A. GrovePULSE: a Pluggable User-space Linux Security Environment paper.AISC19-252008Conference and Workshop Papersclosedconf/auisc/MurrayG08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Murray.htmlhttps://dblp.org/rec/conf/auisc/MurrayG08URL#5322122Vijayakrishnan PasupathinathanJosef PieprzykHuaxiong WangFormal Security Analysis of Australian E-passport Implementation.AISC75-822008Conference and Workshop Papersclosedconf/auisc/Pasupathinathan08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Vijayakrishnan.htmlhttps://dblp.org/rec/conf/auisc/Pasupathinathan08URL#5322123Quan PhamJason ReidAdrian McCullaghEd DawsonCommitment Issues in Delegation Process.AISC27-382008Conference and Workshop Papersclosedconf/auisc/PhamRMD08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Pham.htmlhttps://dblp.org/rec/conf/auisc/PhamRMD08URL#5322124Qiong RenYi Mu 0001Willy SusiloMitigating Phishing with ID-based Online/Offline Authentication.AISC59-642008Conference and Workshop Papersclosedconf/auisc/RenMS08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ren.htmlhttps://dblp.org/rec/conf/auisc/RenMS08URL#5322125Suriadi SuriadiErnest FooRong DuLayered Identity Infrastructure Model for Identity Meta Systems.AISC83-922008Conference and Workshop Papersclosedconf/auisc/SuriadiFD08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Suriadi.htmlhttps://dblp.org/rec/conf/auisc/SuriadiFD08URL#5322126Timo WianderImplementing the ISO/IEC 17799 standard in practice - experiences on audit phases.AISC115-1192008Conference and Workshop Papersclosedconf/auisc/Wiander08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Wiander.htmlhttps://dblp.org/rec/conf/auisc/Wiander08URL#5322127Mohammed Al ZomaiBander AlFayyadhAudun JøsangAdrian McCullaghAn Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems.AISC65-732008Conference and Workshop Papersclosedconf/auisc/ZomaiAJM08http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81AlZomai.htmlhttps://dblp.org/rec/conf/auisc/ZomaiAJM08URL#5322128Ljiljana BrankovicMirka MillerSixth Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, January 2008AISCCRPIT81Australian Computer Society2008Editorshipconf/auisc/2008http://crpit.scem.westernsydney.edu.au/Vol81.htmlhttps://dblp.org/rec/conf/auisc/2008URL#5429515