Show simple item record

dc.contributor.authorStebila, D
dc.contributor.authorFoo, E
dc.description.abstractThis special issue of the International Journal of Applied Cryptography contains extended versions of six papers originally published in the 20th Australasian Conference on Information Security and Privacy (ACISP), held at the Queensland University of Technology in Brisbane, Australia, from June 29 to July 1, 2015. ACISP is Australia and New Zealand’s pre-eminent academic conference on information security, cryptography, and privacy, and for more than 20 years it has served to bring together Australasian security researchers and practitioners while serving the international academic community at a high standard. ACISP 2015 received 112 submissions, of which 28 were accepted for publication in the conference based on the efforts of our 34 program committee members and with the assistance of 90 external reviewers. Based on scores provided by the program committee, we invited the authors of 12 papers to submit extended versions of their work to IJACT, and six accepted the invitation. These extended papers include additional constructions and analysis, and more detailed proofs than appeared in the conference proceedings; all received fresh reviews and some underwent multiple rounds of revisions. We are pleased to present this special issue of IJACT highlighting papers from ACISP 2015, and showcasing the work of research teams from Australia, India, and Japan, in the areas of public key and symmetric authenticated encryption, identity-based encryption, cryptographic protocols, and cryptanalysis of symmetric encryption. We thank the editors-in-chief of IJACT for giving us the opportunity to present these works
dc.publisherInderscience Publishers
dc.relation.ispartofjournalInternational Journal of Applied Cryptography
dc.subject.fieldofresearchData management and data science
dc.typeJournal article
dc.type.descriptionC2 - Articles (Other)
dcterms.bibliographicCitationStebila, D; Foo, E, Preface, International Journal of Applied Cryptography, 2017, 3 (3), pp. 195-195
gro.hasfulltextNo Full Text
gro.griffith.authorFoo, Ernest

Files in this item


There are no files associated with this item.

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record