04516nam 22007455 450 99646596110331620200703144458.03-319-40367-210.1007/978-3-319-40367-0(CKB)3710000000765248(DE-He213)978-3-319-40367-0(MiAaPQ)EBC6303482(MiAaPQ)EBC5577995(Au-PeEL)EBL5577995(OCoLC)953414558(PPN)194514803(EXLCZ)99371000000076524820160702d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security and Privacy[electronic resource] 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II /edited by Joseph K. Liu, Ron Steinfeld1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XVIII, 517 p. 46 illus.) Security and Cryptology ;97233-319-40366-4 Includes bibliographical references and index.Signature and Key Management -- Public Key and Identity-Based Encryption -- Searchable Encryption -- Broadcast Encryption -- Mathematical Primitives -- Symmetric Cipher -- Public Key and Identity-Based Encryption -- Biometric Security -- Digital Forensics -- National Security Infrastructure -- Mobile Security -- Network Security -- Pseudo Random/One-Way Function.The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.Security and Cryptology ;9723Computer securityData encryption (Computer science)Management information systemsComputer scienceAlgorithmsComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer security.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Computers and civilization.Systems and Data Security.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Computers and Society.005.8Liu Joseph Kedthttp://id.loc.gov/vocabulary/relators/edtSteinfeld Ronedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465961103316Information Security and Privacy2569701UNISA00709nac# 22002051i 450 UON0006740620231205102336.5720020107f |0itac50 baUS|||| |||||b||||||||||The history of human societyGeneral editor.: J. H. Plumb001UON000799302001 A history of AfricaJ. D. Fage210 New YorkKnopf1978215 x, 534 p.ill., c. geogr., p. di tav.22 cmUSNew YorkUONL000050PLUMBJ. H.UONV052512KnopfUONV248446650ITSOL20240220RICAUON00067406History of Human Society1838773UNIOR