Skip to main content
  • Conference proceedings
  • © 2014

Information Security and Privacy

19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8544)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Cryptographic Protocols

    1. Strongly Simulation-Extractable Leakage-Resilient NIZK

      • Yuyu Wang, Keisuke Tanaka
      Pages 66-81
    2. A Secure Three-Party Computational Protocol for Triangle Area

      • Liang Liu, Xiaofeng Chen, Wenjing Lou
      Pages 82-97
    3. TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage

      • Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia
      Pages 115-130
  3. Cryptanalysis

    1. Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets

      • Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu
      Pages 131-147
    2. Further Research on N-1 Attack against Exponentiation Algorithms

      • Zhaojing Ding, Wei Guo, Liangjian Su, Jizeng Wei, Haihua Gu
      Pages 162-175
    3. Cryptanalysis of RSA with Multiple Small Secret Exponents

      • Atsushi Takayasu, Noboru Kunihiro
      Pages 176-191
  4. Fine-grain Cryptographic Protocols

    1. Incrementally Executable Signcryptions

      • Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa
      Pages 226-241
    2. Hierarchical Identity-Based Broadcast Encryption

      • Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin
      Pages 242-257
  5. Key Exchange

    1. Continuous After-the-Fact Leakage-Resilient Key Exchange

      • Janaka Alawatugoda, Colin Boyd, Douglas Stebila
      Pages 258-273
  6. Fundamentals

    1. On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption

      • Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
      Pages 290-305

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Editors and Affiliations

  • Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia

    Willy Susilo, Yi Mu

Bibliographic Information

  • Book Title: Information Security and Privacy

  • Book Subtitle: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

  • Editors: Willy Susilo, Yi Mu

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-08344-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-08343-8Published: 14 July 2014

  • eBook ISBN: 978-3-319-08344-5Published: 05 July 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 464

  • Number of Illustrations: 61 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access