Skip to Content

Faculty of Science

Australasian Information Security Conference (AISC) 31 Jan 2012

 AISC is a part of ACSW 2012 which will run from 30th January - 2nd February, 2012. RMIT University, Melbourne.

AISC PROGRAM

Tuesday,  31 January 2012
 
ROOM A (Session Chair: Clark Thomborson)
10:30 – 10:50
·         Efficient Identity-based Signcryption without Random Oracles
Peter Hyun-Jeen Lee, Udaya Parampalli and Shivaramakrishnan Narayan
10:50 – 11:10
·         Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d
       Integers
      Vorapong Suppakitpaisarn, Masato Edahiro and Hiroshi Imai
11:10 – 11:30
·         State convergence in the initialisation of the Sfinks stream cipher
Ali Alhamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong
11:30 – 11:50
·         Cryptanalysis of RC4-Based Hash Function
Mohammad Ali Orumiehchiha, Josef Pieprzyk and Ron Steinfeld
11:50 – 12:10
·         Towards a Secure Human-and-Computer Mutual Authentication Protocol
Kenneth Radke, Colin Boyd, Juan Gonzalez Nieto and Margot Brereton
 
LUNCH  
 
ROOM B (Session Chair: Josef Pieprzyk)
16:00 – 16:20
·         Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets
Younes Seifi, Suriadi Suriadi, Ernest Foo and Colin Boyd
16:20 – 16:40
·         Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device
Chris Mills, Colin J. Fidge and Diane Corney
16:40 – 17:00
·         Data Flow Analysis of Embedded Program Expressions
Christopher Doble, Colin J. Fidge and Diane Corney
17:00 – 17:20
·         A taint marking approach to confidentiality violation detection
Christophe Hauser, Frederic Tronel, Jason Reid, Colin Fidge
17:20 – 17:40
·         Improving the Efficiency of RFID Authentication with Pre-Computation
Kaleb Lee, Juan Manuel Gonzalez Nieto and Colin Boyd
 
 
FINISH