LEADER 03619nam 22007575 450 001 9910483318403321 005 20251225205451.0 010 $a3-319-72359-6 024 7 $a10.1007/978-3-319-72359-4 035 $a(CKB)4100000001381784 035 $a(DE-He213)978-3-319-72359-4 035 $a(MiAaPQ)EBC6281025 035 $a(MiAaPQ)EBC5590970 035 $a(Au-PeEL)EBL5590970 035 $a(OCoLC)1015337608 035 $a(PPN)222227893 035 $a(EXLCZ)994100000001381784 100 $a20171208d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Practice and Experience $e13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13?15, 2017, Proceedings /$fedited by Joseph K. Liu, Pierangela Samarati 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVI, 907 p. 211 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10701 311 08$a3-319-72358-8 327 $aBlockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.-  SocialSec track. 330 $aThis book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10701 606 $aData protection 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aComputers and Society 606 $aLegal Aspects of Computing 615 0$aData protection. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aLiu$b Joseph K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483318403321 996 $aInformation Security Practice and Experience$9772300 997 $aUNINA