LEADER 02967nam 22006855 450 001 9910484563703321 005 20251226200544.0 010 $a3-319-08344-9 024 7 $a10.1007/978-3-319-08344-5 035 $a(CKB)3710000000219379 035 $a(SSID)ssj0001297118 035 $a(PQKBManifestationID)11858100 035 $a(PQKBTitleCode)TC0001297118 035 $a(PQKBWorkID)11354703 035 $a(PQKB)10648394 035 $a(DE-He213)978-3-319-08344-5 035 $a(MiAaPQ)EBC5579065 035 $a(PPN)179925482 035 $a(EXLCZ)993710000000219379 100 $a20140704d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy $e19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /$fedited by Willy Susilo, Yi Mu 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIV, 464 p. 61 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8544 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-08343-0 320 $aIncludes bibliographic references and index. 327 $aCryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications. 330 $aThis book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8544 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aCryptology 606 $aIT Operations 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aIT Operations. 676 $a005.82 702 $aSusilo$b Willy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484563703321 996 $aInformation Security and Privacy$93395200 997 $aUNINA