03653nam 22007575 450 99619852040331620200629153608.03-319-19962-510.1007/978-3-319-19962-7(CKB)3710000000436892(SSID)ssj0001558556(PQKBManifestationID)16182740(PQKBTitleCode)TC0001558556(PQKBWorkID)14818867(PQKB)11376166(DE-He213)978-3-319-19962-7(MiAaPQ)EBC6281612(MiAaPQ)EBC5578835(Au-PeEL)EBL5578835(OCoLC)912548076(PPN)186399480(EXLCZ)99371000000043689220150624d2015 u| 0engurnn|008mamaatxtccrInformation Security and Privacy[electronic resource] 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /edited by Ernest Foo, Douglas Stebila1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (XI, 510 p. 102 illus.) Security and Cryptology ;9144Bibliographic Level Mode of Issuance: Monograph3-319-19961-7 Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.Security and Cryptology ;9144Computer securityData encryption (Computer science)Management information systemsComputer scienceAlgorithmsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer security.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Systems and Data Security.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.005.8Foo Ernestedthttp://id.loc.gov/vocabulary/relators/edtStebila Douglasedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996198520403316Information Security and Privacy2569701UNISA