Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/61981
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBrankovic, Ljiljanaen
dc.contributor.authorSusilo, Willyen
local.source.editorEditor(s): Ljiljana Brankovic and Willy Susiloen
dc.date.accessioned2024-08-07T00:45:51Z-
dc.date.available2024-08-07T00:45:51Z-
dc.date.issued2009-01-01-
dc.identifier.citationInformation Security 2009, p. vii-viien
dc.identifier.isbn9781920682798en
dc.identifier.urihttps://hdl.handle.net/1959.11/61981-
dc.description.abstract<p>The Australasian Information Security Conference (AISC) 2009 was held on the 20th and 21st of January 2009 in Wellington, New Zealand, as a part of the Australasian Computer Science Week 2009. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote synergy between academic and industrial researchers working in this area.</p> <p>This year we received 27 submissions from Australia, Brazil, China, Germany, India, Iran, Japan, Luxembourg, Mauritius, New Zealand, Pakistan, Singapore and Taiwan. After a thorough refereeing process we accepted 11 papers for presentation at AISC2009. </p> <p>Following AISC tradition from the previous years, we have selected a paper for the Best Student Paper Prize. Papers can be considered for this award only if the major contribution is due to a student author, who must be the first author of the paper.</p> <p>This year the award went to Huseyin Hisil from the Information Security Institute, Queensland University of Technology for the paper “Faster Group Operations on Elliptic Curves” by Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter and Ed Dawson. Our hearty congratulations to Huseyin and his co-authors on this fine achievement!</p> <p>We extend our deepest thanks to all the AISC2009 authors for their quality submission, all the members of the Program Committee and additional referees for their quality reviews and the invited speaker Clark Thomborson for delivering the lecture on “Foundation for Systems Security”. Special thanks go to Mousa Alfalayleh for his excellent work on maintaining the AISC2009 website and his assistance with e-submissions. We used iChair software to manage the AISC submissions and reviews. We found this software very helpful and easy to use and we thank its authors Thomas Baignres and Matthieu Finiasz for this opportunity. Last but not least we extend our gratitude to the ACSW2009 chair Alex Potanin and other members of the organising committee for their hard work and their continues and invaluable support throughout the preparation of the conference.</p>en
dc.languageenen
dc.publisherAustralian Computer Society, Incen
dc.relation.ispartofInformation Security 2009en
dc.relation.ispartofseriesConferences in Research and Practice in Information Technology Seriesen
dc.relation.isversionof1en
dc.titlePrefaceen
dc.typeBook Chapteren
local.contributor.firstnameLjiljanaen
local.contributor.firstnameWillyen
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryB2en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeAustraliaen
local.format.startpageviien
local.format.endpageviien
local.series.number98en
local.contributor.lastnameBrankovicen
local.contributor.lastnameSusiloen
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/61981en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitlePrefaceen
local.output.categorydescriptionB2 Chapter in a Book - Otheren
local.relation.urlhttps://dl.acm.org/doi/proceedings/10.5555/1862758en
local.search.authorBrankovic, Ljiljanaen
local.search.authorSusilo, Willyen
local.uneassociationNoen
local.atsiresearchNoen
local.isrevisionNoen
local.sensitive.culturalNoen
local.year.published2009en
local.subject.for2020460499 Cybersecurity and privacy not elsewhere classifieden
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Book Chapter
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

Page view(s)

130
checked on Aug 11, 2024
Google Media

Google ScholarTM

Check


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.