Information Security and Privacy [electronic resource] : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings / edited by Willy Susilo, Guomin Yang.
Contributor(s): Susilo, Willy [editor.] | Yang, Guomin [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 10946Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XV, 833 p. 595 illus., 7 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319936383.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Coding theory | Information theory | Computers and civilization | Computers -- Law and legislation | Information technology -- Law and legislation | Computer networks | Data and Information Security | Cryptology | Coding and Information Theory | Computers and Society | Legal Aspects of Computing | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
There are no comments for this item.