Abstract is missing.
- A New Sign-Change Attack on the Montgomery LaddersLynn Margaret Batten, Mohammed Khalil Amain. 3-14 [doi]
- Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORNMd. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong. 15-26 [doi]
- Investigating Security Vulnerabilities in Modern Vehicle SystemsXi Zheng, Lei Pan, Hongxu Chen, Peiyin Wang. 29-40 [doi]
- Tweaking Generic OTR to Avoid Forgery AttacksHassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. 41-53 [doi]
- Recent Cyber Security Attacks and Their Mitigation Approaches - An OverviewAbdullahi Chowdhury. 54-65 [doi]
- Evaluating Entropy Sources for True Random Number Generators by Collision CountingMaciej Skórski. 69-80 [doi]
- Enhancement of Sensor Data Transmission by Inference and Efficient Data ProcessingJames Jin Kang, Tom H. Luan, Henry Larkin. 81-92 [doi]
- An Improved EllipticNet Algorithm for Tate Pairing on Weierstrass' Curves, Faster Point Arithmetic and Pairing on Selmer Curves and a Note on Double Scalar MultiplicationSrinivasa Rao Subramanya Rao. 93-105 [doi]
- Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)Pinaki Sarkar, Morshed Uddin Chowdhury. 106-114 [doi]
- Identity-Based Threshold Encryption on Lattices with Application to Searchable EncryptionVeronika Kuchta, Olivier Markowitch. 117-129 [doi]
- Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage SpaceKarin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun. 130-141 [doi]
- False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor NetworksYufeng Lin, Biplob Ray, Dennis Jarvis, Jia Wang. 142-153 [doi]
- Mobile Money in the Australasian Region - A Technical Security PerspectiveSwathi Parasa, Lynn Margaret Batten. 154-162 [doi]