Preface
File version
Author(s)
Foo, E
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
License
Abstract
This special issue of the International Journal of Applied Cryptography contains extended versions of six papers originally published in the 20th Australasian Conference on Information Security and Privacy (ACISP), held at the Queensland University of Technology in Brisbane, Australia, from June 29 to July 1, 2015. ACISP is Australia and New Zealand’s pre-eminent academic conference on information security, cryptography, and privacy, and for more than 20 years it has served to bring together Australasian security researchers and practitioners while serving the international academic community at a high standard. ACISP 2015 received 112 submissions, of which 28 were accepted for publication in the conference based on the efforts of our 34 program committee members and with the assistance of 90 external reviewers. Based on scores provided by the program committee, we invited the authors of 12 papers to submit extended versions of their work to IJACT, and six accepted the invitation. These extended papers include additional constructions and analysis, and more detailed proofs than appeared in the conference proceedings; all received fresh reviews and some underwent multiple rounds of revisions. We are pleased to present this special issue of IJACT highlighting papers from ACISP 2015, and showcasing the work of research teams from Australia, India, and Japan, in the areas of public key and symmetric authenticated encryption, identity-based encryption, cryptographic protocols, and cryptanalysis of symmetric encryption. We thank the editors-in-chief of IJACT for giving us the opportunity to present these works
Journal Title
International Journal of Applied Cryptography
Conference Title
Book Title
Edition
Volume
3
Issue
3
Thesis Type
Degree Program
School
DOI
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject
Data management and data science
Persistent link to this record
Citation
Stebila, D; Foo, E, Preface, International Journal of Applied Cryptography, 2017, 3 (3), pp. 195-195