


default search action
6. ATIS 2016: Cairns, QLD, Australia
- Lynn Batten, Gang Li:

Applications and Techniques in Information Security - 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings. Communications in Computer and Information Science 651, 2016, ISBN 978-981-10-2740-6
Attacks on Data Security Systems
- Lynn Margaret Batten, Mohammed Khalil Amain

:
A New Sign-Change Attack on the Montgomery Ladders. 3-14 - Md. Iftekhar Salam

, Harry Bartlett
, Ed Dawson
, Josef Pieprzyk
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN. 15-26
Detection of Attacks on Data Security Systems
- Xi Zheng

, Lei Pan
, Hongxu Chen, Peiyin Wang:
Investigating Security Vulnerabilities in Modern Vehicle Systems. 29-40 - Hassan Qahur Al Mahri, Leonie Simpson

, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
Tweaking Generic OTR to Avoid Forgery Attacks. 41-53 - Abdullahi Chowdhury

:
Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview. 54-65
Data Security
- Maciej Skórski:

Evaluating Entropy Sources for True Random Number Generators by Collision Counting. 69-80 - James Jin Kang

, Tom H. Luan
, Henry Larkin:
Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing. 81-92 - Srinivasa Rao Subramanya Rao:

An Improved EllipticNet Algorithm for Tate Pairing on Weierstrass' Curves, Faster Point Arithmetic and Pairing on Selmer Curves and a Note on Double Scalar Multiplication. 93-105 - Pinaki Sarkar, Morshed Uddin Chowdhury

:
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi). 106-114
Data Privacy
- Veronika Kuchta, Olivier Markowitch:

Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption. 117-129 - Karin Sumongkayothin, Steven Gordon

, Atsuko Miyaji
, Chunhua Su, Komwut Wipusitwarakun:
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space. 130-141 - Yufeng Lin, Biplob Ray

, Dennis Jarvis, Jia Wang:
False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks. 142-153 - Swathi Parasa, Lynn Margaret Batten:

Mobile Money in the Australasian Region - A Technical Security Perspective. 154-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














