Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings / [electronic resource] : edited by Ernest Foo, Douglas Stebila. - XI, 510 p. 102 illus. online resource. - Lecture Notes in Computer Science, 9144 0302-9743 ; . - Lecture Notes in Computer Science, 9144 .

Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.

9783319199627

10.1007/978-3-319-19962-7 doi


Computer science.
Computer security.
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.

QA76.9.A25

005.8