Normal view MARC view ISBD view

Information Security and Privacy [electronic resource] : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings / edited by Ernest Foo, Douglas Stebila.

Contributor(s): Foo, Ernest [editor.] | Stebila, Douglas [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 9144Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Description: XI, 510 p. 102 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319199627.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Algorithms | Management information systems | Computer Science | Systems and Data Security | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.
In: Springer eBooksSummary: This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
    average rating: 0.0 (0 votes)
No physical items for this record

Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.

There are no comments for this item.

Log in to your account to post a comment.