Search dblp for Publications

export results for "stream:conf/auisc:"

 download as .bib file

@inproceedings{DBLP:conf/auisc/DiSBDW15,
  author       = {Binbin Di and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Correcting flaws in Mitchell's analysis of {EPBC}},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {57--60},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Di.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/DiSBDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/HerreraC15,
  author       = {Adrian Herrera and
                  Ben Cheney},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {{JMD:} {A} Hybrid Approach for Detecting Java Malware},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {3--13},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Herrera.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/HerreraC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/JayarathnaTV15,
  author       = {Dilshan Jayarathna and
                  Udaya Kiran Tupakula and
                  Vijay Varadharajan},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Hypervisor-based Security Architecture to Protect Web Applications},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {15--24},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Jayarathna.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/JayarathnaTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/ManiHCM15,
  author       = {Deepa Mani and
                  Alireza Heravi and
                  Kim{-}Kwang Raymond Choo and
                  Sameera Mubarak},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Information Privacy Concerns of Real Estate Customers and Information
                  Security in the Real Estate Industry: an Empirical Analysis},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {53--56},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Mani.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/ManiHCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MyersFR15,
  author       = {David Myers and
                  Ernest Foo and
                  Kenneth Radke},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Internet-wide Scanning Taxonomy and Framework},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {61--65},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Myers.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MyersFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/NewbyGMOMN15,
  author       = {Tristan Newby and
                  Duncan A. Grove and
                  Alex Murray and
                  Chris A. Owen and
                  Jim McCarthy and
                  Chris J. North},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Annex: {A} Middleware for Constructing High-Assurance Software Systems},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {25--34},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Newby.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/NewbyGMOMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RicherNO15,
  author       = {Toby J. Richer and
                  Grant Neale and
                  Grant Osborne},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {On the {E} ectiveness of Virtualisation Assisted View Comparison for
                  Rootkit Detection},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {35--44},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Richer.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RicherNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RodofileRF15,
  author       = {Nicholas R. Rodofile and
                  Kenneth Radke and
                  Ernest Foo},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Real-Time and Interactive Attacks on {DNP3} Critical Infrastructure
                  Using Scapy},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {67--70},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Rodofile.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RodofileRF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/ShieldHBN15,
  author       = {John Shield and
                  Bradley D. Hopkins and
                  Mark R. Beaumont and
                  Chris North},
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {Hardware Trojans - {A} Systemic Threat},
  booktitle    = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  pages        = {45--51},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV161Shield.html},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/ShieldHBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2015,
  editor       = {Ian Welch and
                  Xun Yi},
  title        = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
                  Australia, January 2015},
  series       = {{CRPIT}},
  volume       = {161},
  publisher    = {Australian Computer Society},
  year         = {2015},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol161.html},
  isbn         = {978-1-921770-43-2},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Al-HamdanBDSW14,
  author       = {Ali Al{-}Hamdan and
                  Harry Bartlett and
                  Ed Dawson and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Weak key-IV Pairs in the {A5/1} Stream Cipher},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {23--36},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Alhamdan.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Al-HamdanBDSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/BajajP14,
  author       = {Kamini Bajaj and
                  Josef Pieprzyk},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {A Case Study of User-Level Spam Filtering},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {67--75},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Bajaj.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/BajajP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/BhatiaKDAF14,
  author       = {Sajal Bhatia and
                  Nishchal Kush and
                  Chris I. Djamaludin and
                  Ayodeji James Akande and
                  Ernest Foo},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Practical Modbus Flooding Attack and Detection},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {57--65},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Bhatia.html},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/auisc/BhatiaKDAF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/JayarathnaTV14,
  author       = {Dilshan Jayarathna and
                  Udaya Kiran Tupakula and
                  Vijay Varadharajan},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Hypervisor-based Security Architecture for Validating {DNS} Services
                  (Poster)},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {83--86},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Jayarathna.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/JayarathnaTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/KushABF14,
  author       = {Nishchal Kush and
                  Ejaz Ahmed and
                  Mark Branagan and
                  Ernest Foo},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Poisoned {GOOSE:} Exploiting the {GOOSE} Protocol},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {17--22},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Kush.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/KushABF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MansooriWF14,
  author       = {Masood Mansoori and
                  Ian Welch and
                  Qiang Fu},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {YALIH, Yet Another Low Interaction Honeyclient},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {7--15},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Mansoori.html},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MansooriWF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RadkeBNMS14,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Douglas Stebila},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Formalising Human Recognition: a Fundamental Building Block for Security
                  Proofs},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {37--45},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RadkeBNMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/SeneviratnePK14,
  author       = {Janaka Seneviratne and
                  Udaya Parampalli and
                  Lars Kulik},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {An Authorised Pseudonym System for Privacy Preserving Location Proof
                  Architectures},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {47--56},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Seneviratne.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/SeneviratnePK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/TeoWBSD14,
  author       = {Sui{-}Guan Teo and
                  Kenneth Koon{-}Ho Wong and
                  Harry Bartlett and
                  Leonie Simpson and
                  Ed Dawson},
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Algebraic analysis of Trivium-like ciphers (Poster)},
  booktitle    = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  pages        = {77--81},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Teo.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/TeoWBSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2014,
  editor       = {Udaya Parampalli and
                  Ian Welch},
  title        = {Twelfth Australasian Information Security Conference, {AISC} 2014,
                  Auckland, New Zealand, January 2014},
  series       = {{CRPIT}},
  volume       = {149},
  publisher    = {Australian Computer Society},
  year         = {2014},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol149.html},
  isbn         = {978-1-921770-32-6},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Al-HamdanBDSW13,
  author       = {Ali Al{-}Hamdan and
                  Harry Bartlett and
                  Ed Dawson and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Slid Pairs in the Initialisation of the {A5/1} Stream Cipher},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {3--12},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Alhamdan.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Al-HamdanBDSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Alpcan13,
  author       = {Tansu Alpcan},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {A Decision and Game Theoretic Approach to Networked System Security
                  with Applications to Power Grid (Invited Lecture)},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {77--78},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Alpcan.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Alpcan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AriffinCS13,
  author       = {Aswami Ariffin and
                  Kim{-}Kwang Raymond Choo and
                  Jill Slay},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Digital Camcorder Forensics},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {39--48},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Ariffin.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AriffinCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AsaarVS13,
  author       = {Maryam Rajabzadeh Asaar and
                  Ali Vardasbi and
                  Mahmoud Salmasizadeh},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Non-Delegatable Strong Designated Verifier Signature Using a Trusted
                  Third Party without Pairings},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {13--25},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Asaar.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AsaarVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/GroveMGTTM13,
  author       = {Duncan A. Grove and
                  Alex Murray and
                  Damien Gerhardy and
                  Benjamin P. Turnbull and
                  Troy Tobin and
                  Christopher Moir},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {An Overview of the Parallax BattleMind v1.5 for Computer Network Defence},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {31--38},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Grove.html},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/GroveMGTTM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LeWGK13,
  author       = {Van Lam Le and
                  Ian Welch and
                  Xiaoying Gao and
                  Peter Komisarczuk},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Anatomy of Drive-by Download Attack},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {49--58},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Le.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LeWGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MohammadzadehMW13,
  author       = {Hadi Mohammadzadeh and
                  Masood Mansoori and
                  Ian Welch},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Evaluation of Fingerprinting Techniques and a Windows-based Dynamic
                  Honeypot},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {59--66},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Mohammadzadeh.html},
  timestamp    = {Mon, 12 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MohammadzadehMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MorrisVS13,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Elena Sitnikova},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Advances in the Protection of Critical Infrastructure by Improvement
                  in Industrial Control System Security},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {67--76},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Morris.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MorrisVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/PauletY13,
  author       = {Russell Paulet and
                  Xun Yi},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption
                  Scheme},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {25--30},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Paulet.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/PauletY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2013,
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol138.html},
  isbn         = {978-1-921770-23-4},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Al-HamdanBSDW12,
  author       = {Ali Al{-}Hamdan and
                  Harry Bartlett and
                  Leonie Simpson and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {State convergence in the initialisation of the Sfinks stream cipher},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {27--32},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Alhamdan.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Al-HamdanBSDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/DobleFC12,
  author       = {Christopher Doble and
                  Colin J. Fidge and
                  Diane Corney},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Data Flow Analysis of Embedded Program Expressions},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {71--82},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Doble.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/DobleFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/HauserTRF12,
  author       = {Christophe Hauser and
                  Fr{\'{e}}d{\'{e}}ric Tronel and
                  Jason Reid and
                  Colin J. Fidge},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {A taint marking approach to confidentiality violation detection},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {83--90},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Hauser.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/HauserTRF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LeeNB12,
  author       = {Kaleb Lee and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Improving the Efficiency of {RFID} Authentication with Pre-Computation},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {91--100},
  publisher    = {Australian Computer Society},
  year         = {2012},
  timestamp    = {Fri, 01 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/auisc/LeeNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LeePN12,
  author       = {Peter Hyun{-}Jeen Lee and
                  Udaya Parampalli and
                  Shivaramakrishnan Narayan},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {E cient Identity-based Signcryption without Random Oracles},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {3--14},
  publisher    = {Australian Computer Society},
  year         = {2012},
  timestamp    = {Fri, 01 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/auisc/LeePN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MillsFC12,
  author       = {Chris Mills and
                  Colin J. Fidge and
                  Diane Corney},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {59--70},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Mills.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MillsFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/OrumiehchihaPS12,
  author       = {Mohammad Ali Orumiehchiha and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Cryptanalysis of RC4-Based Hash Function},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {33--38},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Orumiehchiha.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/OrumiehchihaPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RadkeBNB12,
  author       = {Kenneth Radke and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Margot Brereton},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Towards a Secure Human-and-Computer Mutual Authentication Protocol},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {39--46},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Radke.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RadkeBNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/SeifiSFB12,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Analysis of Object-Specific Authorization Protocol {(OSAP)} using
                  Coloured Petri Nets},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {47--58},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Seifi.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/SeifiSFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Suppakitpaisarn12,
  author       = {Vorapong Suppakitpaisarn and
                  Masato Edahiro and
                  Hiroshi Imai},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of
                  d Integers},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {15--26},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Suppakitpaisarn.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Suppakitpaisarn12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2012,
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol125.html},
  isbn         = {978-1-921770-06-7},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AgnesseP11,
  author       = {Andrea Agnesse and
                  Marco Pedicini},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Cube Attack in Finite Fields of Higher Order},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {9--14},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Agnesse.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AgnesseP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/BaiK11,
  author       = {Yun Bai and
                  Khaled M. Khan},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {A Modal Logic for Information System Security},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {51--56},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Bai.html},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/BaiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/CampbellCL11,
  author       = {Scott Campbell and
                  Steve Chan and
                  Jason Lee},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Detection of Fast Flux Service Networks},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {57--66},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Campbell.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/CampbellCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/CorneyMC11,
  author       = {Malcolm Corney and
                  George M. Mohay and
                  Andrew J. Clark},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Detection of Anomalies from User Profiles Generated from System Logs},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {23--32},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Corney.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/CorneyMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/KaosarPY11,
  author       = {Md. Golam Kaosar and
                  Russell Paulet and
                  Xun Yi},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Secure Two-Party Association Rule Mining},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {15--22},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Kaosar.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/KaosarPY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LacknerT11,
  author       = {G{\"{u}}nther Lackner and
                  Peter Teufl},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {{IEEE} 802.11 Chipset Fingerprinting by the Measurement of Timing
                  Characteristics},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {41--50},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Lackner.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LacknerT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LeWGK11,
  author       = {Van Lam Le and
                  Ian Welch and
                  Xiaoying Gao and
                  Peter Komisarczuk},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Identification of Potential Malicious Web Pages},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {33--40},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Le.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LeWGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/NakamuraIBIY11,
  author       = {Toru Nakamura and
                  Shunsuke Inenaga and
                  Kensuke Baba and
                  Daisuke Ikeda and
                  Hiroto Yasuura},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {An Anonymous Authentication Protocol with Single-database {PIR}},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {3--8},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Nakamura.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/NakamuraIBIY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/PalmerBW11,
  author       = {Ben Palmer and
                  Kris Bubendorfer and
                  Ian Welch},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Development and Evaluation of a Secure, Privacy Preserving Combinatorial
                  Auction},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {67--76},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Palmer.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/PalmerBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RiesSP11,
  author       = {Thorsten Ries and
                  Radu State and
                  Andriy Panchenko},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Comparison of Low-Latency Anonymous Communication Systems - Practical
                  Usage and Performance},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {77--86},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Ries.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RiesSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2011,
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol116.html},
  isbn         = {978-1-920682-96-5},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AlfawazNM10,
  author       = {Salahuddin Alfawaz and
                  Karen Nelson and
                  Kavoos Mohannak},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Information security culture: {A} Behaviour Compliance Conceptual
                  Framework},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {47--55},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Alfawaz.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AlfawazNM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/ChrobokTO10,
  author       = {Natascha Chrobok and
                  Andrew Trotman and
                  Richard A. O'Keefe},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Advantages and vulnerabilities of pull-based email-delivery},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {22--31},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Chrobok.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/ChrobokTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/DawsonRSB10,
  author       = {Ed Dawson and
                  Jason Reid and
                  Farzad Salim and
                  Mark Burdon},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Information Sharing in the 21st century: Progress and Challenges},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {2},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Dawson.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/DawsonRSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/HalunenKK10,
  author       = {Kimmo Halunen and
                  Juha Kortelainen and
                  Tuomas Kortelainen},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Combinatorial Multicollision Attacks on Generalized Iterated Hash
                  Functions},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {86--93},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Halunen.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/HalunenKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LangW10,
  author       = {Simon R. Lang and
                  Neville I. Williams},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Impeding {CAPTCHA} Breakers with Visual Decryption},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {39--46},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Lang.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LippoldN10,
  author       = {Georg Lippold and
                  Juanma Gonz{\'{a}}lez Nieto},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Certificateless Key Agreement in the Standard Model},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {75--85},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Lippold.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LippoldN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/SalimRD10,
  author       = {Farzad Salim and
                  Jason Reid and
                  Ed Dawson},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {An Administrative Model for {UCON} {ABC}},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {32--38},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Salim.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/SalimRD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/StebilaUS10,
  author       = {Douglas Stebila and
                  Poornaprajna Udupi and
                  Sheueling Chang Shantz},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Multi-Factor Password-Authenticated Key Exchange},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {56--66},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Stebila.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/StebilaUS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/TangF10,
  author       = {Maolin Tang and
                  Colin J. Fidge},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Reconstruction of Falsified Computer Logs for Digital Forensics Investigations},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {12--21},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Tang.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/TangF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/WangWP10,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Secure Coprocessor-based Private Information Retrieval without Periodical
                  Preprocessing},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {5--11},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Wang.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/WangWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/WongCD10,
  author       = {Kenneth Koon{-}Ho Wong and
                  Gary Carter and
                  Ed Dawson},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {An Analysis of the {RC4} Family of Stream Ciphers against Algebraic
                  Attacks},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {67--74},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Wong.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/WongCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2010,
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol105.html},
  isbn         = {978-1-920682-86-6},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Alcalde0MMR09,
  author       = {Baptiste Alcalde and
                  Eric Dubois and
                  Sjouke Mauw and
                  Nicolas Mayer and
                  Sasa Radomirovic},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Towards a Decision Model Based on Trust and Security Risk Management},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {61--69},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Alcalde.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Alcalde0MMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AraiT09,
  author       = {Masato Arai and
                  Hidehiko Tanaka},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Proposal for Effective Information Flow Control Model for Sharing
                  and Protecting Sensitive Information},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {89--98},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Arai.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AraiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/FusenigSSE09,
  author       = {Volker Fusenig and
                  Eugen Staab and
                  Uli Sorger and
                  Thomas Engel},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Slotted Packet Counting Attacks on Anonymity Protocols},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {53--59},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Fusenig.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/FusenigSSE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Strong Designated Verifier Signature in a Multi-user Setting},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {21--31},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Gorantla.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/HisilWCD09,
  author       = {H{\"{u}}seyin Hisil and
                  Kenneth Koon{-}Ho Wong and
                  Gary Carter and
                  Ed Dawson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Faster Group Operations on Elliptic Curves},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {7--19},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Hisil.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/HisilWCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/LiuFCMS09,
  author       = {Vicky Liu and
                  Luis Franco and
                  William J. Caelli and
                  Lauren May and
                  Tony Sahama},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Open and Trusted Information Systems/Health Informatics Access Control
                  {(OTHIS/HIAC)}},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {99--108},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Liu.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/LiuFCMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/NotoatmodjoT09,
  author       = {Gilbert Notoatmodjo and
                  Clark D. Thomborson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Passwords and Perceptions},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {71--78},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Notoatmodjo.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/NotoatmodjoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/TeradaU09,
  author       = {Routo Terada and
                  Eduardo T. Ueda},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {A New Version of the {RC6} Algorithm, Stronger against {\(\chi\)}\({}^{\mbox{2}}\)
                  Cryptanalysis},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {47--52},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Terada.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/TeradaU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Thomborson09,
  author       = {Clark D. Thomborson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Foundation for Systems Security},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {3},
  publisher    = {Australian Computer Society},
  year         = {2009},
  timestamp    = {Thu, 28 Jan 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/auisc/Thomborson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/TuT09,
  author       = {Yu{-}Cheng Tu and
                  Clark D. Thomborson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Preliminary Security Specification for New Zealand's igovt System},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {79--88},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Tu.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/TuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/ZabaRSDHW09,
  author       = {Muhammad Reza Z'aba and
                  H{\aa}vard Raddum and
                  Leonie Simpson and
                  Ed Dawson and
                  Matt Henricksen and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Algebraic Analysis of {LEX}},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {33--45},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98RezaZaba.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/ZabaRSDHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2009,
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol98.html},
  isbn         = {978-1-920682-79-8},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AlzaidFN08,
  author       = {Hani Alzaid and
                  Ernest Foo and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Secure Data Aggregation in Wireless Sensor Network: a survey},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {93--105},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Alzaid.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AlzaidFN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AyedCC08,
  author       = {Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Deploying Access Control in Distributed Workflow},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {9--17},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ayed.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AyedCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/BihamS08,
  author       = {Eli Biham and
                  Jennifer Seberry},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {A New Very Fast Stream Cipher : Tpy},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {5},
  publisher    = {Australian Computer Society},
  year         = {2008},
  timestamp    = {Mon, 06 Jul 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/BihamS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Caballero-Gil08,
  author       = {Pino Caballero{-}Gil},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Current Topics in Security of Mobile Ad-hoc NETworks},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {3},
  publisher    = {Australian Computer Society},
  year         = {2008},
  timestamp    = {Mon, 06 Jul 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Caballero-Gil08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/FusenigSE08,
  author       = {Volker Fusenig and
                  Dagmara Spiewak and
                  Thomas Engel},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Acimn: {A} protocol for Anonymous Communication In Multi hop wireless
                  networks},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {107--114},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Fusenig.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/FusenigSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Fuster-SabaterC08,
  author       = {Amparo F{\'{u}}ster{-}Sabater and
                  Pino Caballero{-}Gil},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Linear Cellular Automata as Discrete Models for Generating Cryptographic
                  Sequences},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {47--52},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81FusterSabater.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Fuster-SabaterC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/GorantlaBN08,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {ID-based One-pass Authenticated Key Establishment},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {39--46},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Gorantla.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/GorantlaBN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/JosangA08,
  author       = {Audun J{\o}sang and
                  Bander AlFayyadh},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Robust {WYSIWYS:} {A} Method for Ensuring that What You See Is What
                  You Sign},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {53--58},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Josang.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/JosangA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MurrayG08,
  author       = {Alex Murray and
                  Duncan A. Grove},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {{PULSE:} a Pluggable User-space Linux Security Environment paper},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {19--25},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Murray.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MurrayG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Pasupathinathan08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Formal Security Analysis of Australian E-passport Implementation},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {75--82},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Vijayakrishnan.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Pasupathinathan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/PhamRMD08,
  author       = {Quan Pham and
                  Jason Reid and
                  Adrian McCullagh and
                  Ed Dawson},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Commitment Issues in Delegation Process},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {27--38},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Pham.html},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/PhamRMD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/RenMS08,
  author       = {Qiong Ren and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Mitigating Phishing with ID-based Online/Offline Authentication},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {59--64},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ren.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/RenMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/SuriadiFD08,
  author       = {Suriadi Suriadi and
                  Ernest Foo and
                  Rong Du},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Layered Identity Infrastructure Model for Identity Meta Systems},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {83--92},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Suriadi.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/SuriadiFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Wiander08,
  author       = {Timo Wiander},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Implementing the {ISO/IEC} 17799 standard in practice - experiences
                  on audit phases},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {115--119},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Wiander.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Wiander08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/ZomaiAJM08,
  author       = {Mohammed Al Zomai and
                  Bander AlFayyadh and
                  Audun J{\o}sang and
                  Adrian McCullagh},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {An Experimental Investigation of the Usability of Transaction Authorization
                  in Online Bank Security Systems},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {65--73},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81AlZomai.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/ZomaiAJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2008,
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol81.html},
  isbn         = {978-1-920682-62-0},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}