04482nam 22007455 450 99646600250331620200629161046.03-319-40253-610.1007/978-3-319-40253-6(CKB)3710000000734805(DE-He213)978-3-319-40253-6(MiAaPQ)EBC6301277(MiAaPQ)EBC5577862(Au-PeEL)EBL5577862(OCoLC)953413141(PPN)194378438(EXLCZ)99371000000073480520160629d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security and Privacy[electronic resource] 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I /edited by Joseph K. Liu, Ron Steinfeld1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XVIII, 543 p. 114 illus.) Security and Cryptology ;9722Includes index.3-319-40252-8 National Security Infrastructure -- Social Network Security -- Bitcoin Security -- Statistical Privacy -- Network Security -- Smart City Security -- Digital Forensics -- Lightweight Security -- Secure Batch Processing -- Pseudo Random/One-Way Function -- Cloud Storage Security -- Password/QR Code Security -- Functional Encryption and Attribute-Based Cryptosystem.The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.Security and Cryptology ;9722Computer securityData encryption (Computer science)Management information systemsComputer scienceAlgorithmsComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer security.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Computers and civilization.Systems and Data Security.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Computers and Society.005.8Liu Joseph Kedthttp://id.loc.gov/vocabulary/relators/edtSteinfeld Ronedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466002503316Information Security and Privacy2569701UNISA