03908nam 22007935 450 99646550900331620200630033302.03-642-22497-010.1007/978-3-642-22497-3(CKB)2670000000095968(SSID)ssj0000537915(PQKBManifestationID)11335182(PQKBTitleCode)TC0000537915(PQKBWorkID)10556896(PQKB)10150753(DE-He213)978-3-642-22497-3(MiAaPQ)EBC3066950(PPN)156311828(EXLCZ)99267000000009596820110702d2011 u| 0engurnn|008mamaatxtccrInformation Security and Privacy[electronic resource] 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings /edited by Udaya Parampalli, Philip Hawkes1st ed. 2011.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2011.1 online resource (XIII, 464 p.) Security and Cryptology ;6812Bibliographic Level Mode of Issuance: Monograph3-642-22496-2 Includes bibliographical references and index.This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.Security and Cryptology ;6812Data encryption (Computer science)Management information systemsComputer scienceOperating systems (Computers)Computer communication systemsComputer science—MathematicsOptical data processingCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Computer Imaging, Vision, Pattern Recognition and Graphicshttps://scigraph.springernature.com/ontologies/product-market-codes/I22005Data encryption (Computer science).Management information systems.Computer science.Operating systems (Computers).Computer communication systems.Computer science—Mathematics.Optical data processing.Cryptology.Management of Computing and Information Systems.Operating Systems.Computer Communication Networks.Discrete Mathematics in Computer Science.Computer Imaging, Vision, Pattern Recognition and Graphics.005.82Parampalli Udayaedthttp://id.loc.gov/vocabulary/relators/edtHawkes Philipedthttp://id.loc.gov/vocabulary/relators/edtACISP (Conference)BOOK996465509003316Information Security and Privacy772014UNISA