Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/61981
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brankovic, Ljiljana | en |
dc.contributor.author | Susilo, Willy | en |
local.source.editor | Editor(s): Ljiljana Brankovic and Willy Susilo | en |
dc.date.accessioned | 2024-08-07T00:45:51Z | - |
dc.date.available | 2024-08-07T00:45:51Z | - |
dc.date.issued | 2009-01-01 | - |
dc.identifier.citation | Information Security 2009, p. vii-vii | en |
dc.identifier.isbn | 9781920682798 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/61981 | - |
dc.description.abstract | <p>The Australasian Information Security Conference (AISC) 2009 was held on the 20th and 21st of January 2009 in Wellington, New Zealand, as a part of the Australasian Computer Science Week 2009. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote synergy between academic and industrial researchers working in this area.</p> <p>This year we received 27 submissions from Australia, Brazil, China, Germany, India, Iran, Japan, Luxembourg, Mauritius, New Zealand, Pakistan, Singapore and Taiwan. After a thorough refereeing process we accepted 11 papers for presentation at AISC2009. </p> <p>Following AISC tradition from the previous years, we have selected a paper for the Best Student Paper Prize. Papers can be considered for this award only if the major contribution is due to a student author, who must be the first author of the paper.</p> <p>This year the award went to Huseyin Hisil from the Information Security Institute, Queensland University of Technology for the paper “Faster Group Operations on Elliptic Curves” by Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter and Ed Dawson. Our hearty congratulations to Huseyin and his co-authors on this fine achievement!</p> <p>We extend our deepest thanks to all the AISC2009 authors for their quality submission, all the members of the Program Committee and additional referees for their quality reviews and the invited speaker Clark Thomborson for delivering the lecture on “Foundation for Systems Security”. Special thanks go to Mousa Alfalayleh for his excellent work on maintaining the AISC2009 website and his assistance with e-submissions. We used iChair software to manage the AISC submissions and reviews. We found this software very helpful and easy to use and we thank its authors Thomas Baignres and Matthieu Finiasz for this opportunity. Last but not least we extend our gratitude to the ACSW2009 chair Alex Potanin and other members of the organising committee for their hard work and their continues and invaluable support throughout the preparation of the conference.</p> | en |
dc.language | en | en |
dc.publisher | Australian Computer Society, Inc | en |
dc.relation.ispartof | Information Security 2009 | en |
dc.relation.ispartofseries | Conferences in Research and Practice in Information Technology Series | en |
dc.relation.isversionof | 1 | en |
dc.title | Preface | en |
dc.type | Book Chapter | en |
local.contributor.firstname | Ljiljana | en |
local.contributor.firstname | Willy | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | B2 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | Australia | en |
local.format.startpage | vii | en |
local.format.endpage | vii | en |
local.series.number | 98 | en |
local.contributor.lastname | Brankovic | en |
local.contributor.lastname | Susilo | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/61981 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Preface | en |
local.output.categorydescription | B2 Chapter in a Book - Other | en |
local.relation.url | https://dl.acm.org/doi/proceedings/10.5555/1862758 | en |
local.search.author | Brankovic, Ljiljana | en |
local.search.author | Susilo, Willy | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.isrevision | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2009 | en |
local.subject.for2020 | 460499 Cybersecurity and privacy not elsewhere classified | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Book Chapter School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
Page view(s)
130
checked on Aug 11, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.