03634nam 22007695 450 991034942660332120200703114237.03-319-93638-710.1007/978-3-319-93638-3(CKB)3850000000034608(DE-He213)978-3-319-93638-3(MiAaPQ)EBC6286103(PPN)22950227X(EXLCZ)99385000000003460820180613d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /edited by Willy Susilo, Guomin Yang1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XV, 833 p. 127 illus.) Security and Cryptology ;10946Includes index.3-319-93637-9 This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.Security and Cryptology ;10946Computer securityData encryption (Computer science)Coding theoryInformation theoryComputers and civilizationComputersLaw and legislationComputer communication systemsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computer security.Data encryption (Computer science).Coding theory.Information theory.Computers and civilization.Computers.Law and legislation.Computer communication systems.Systems and Data Security.Cryptology.Coding and Information Theory.Computers and Society.Legal Aspects of Computing.Computer Communication Networks.005.8Susilo Willyedthttp://id.loc.gov/vocabulary/relators/edtYang Guominedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349426603321Information Security and Privacy3395200UNINA