03957nam 22008175 450 99646575890331620200704015824.03-642-31448-110.1007/978-3-642-31448-3(CKB)3400000000085758(SSID)ssj0000745998(PQKBManifestationID)11430129(PQKBTitleCode)TC0000745998(PQKBWorkID)10859568(PQKB)10153906(DE-He213)978-3-642-31448-3(MiAaPQ)EBC3069927(PPN)16831939X(EXLCZ)99340000000008575820120704d2012 u| 0engurnn|008mamaatxtccrInformation Security and Privacy[electronic resource] 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /edited by Willy Susilo, Yi Mu, Jennifer Seberry1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XIV, 460 p. 46 illus.) Security and Cryptology ;7372International conference proceedings.3-642-31447-3 Includes bibliographical references and author index.This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.Security and Cryptology ;7372Computer securityData encryption (Computer science)Management information systemsComputer scienceCoding theoryInformation theoryApplication softwareE-commerceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Computer Appl. in Administrative Data Processinghttps://scigraph.springernature.com/ontologies/product-market-codes/I2301Xe-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Computer security.Data encryption (Computer science).Management information systems.Computer science.Coding theory.Information theory.Application software.E-commerce.Systems and Data Security.Cryptology.Management of Computing and Information Systems.Coding and Information Theory.Computer Appl. in Administrative Data Processing.e-Commerce/e-business.005.8Susilo Willyedthttp://id.loc.gov/vocabulary/relators/edtMu Yiedthttp://id.loc.gov/vocabulary/relators/edtSeberry Jenniferedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465758903316Information Security and Privacy772014UNISA