|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910337860403321 |
|
|
Titolo |
Information Security and Privacy : 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings / / edited by Julian Jang-Jaccard, Fuchun Guo |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 688 p. 377 illus., 70 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 11547 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer organization |
Computers |
Software engineering |
Coding theory |
Information theory |
Systems and Data Security |
Computer Systems Organization and Communication Networks |
Computing Milieux |
Software Engineering/Programming and Operating Systems |
Coding and Information Theory |
Information Systems and Communication Service |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Encryption -- Post-quantum security -- Cryptocurrency related -- Foundations -- System and network security -- Symmetric cryptography. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of |
|
|
|
|
|
|
|
|
|
|
information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography. |
|
|
|
|
|
| |