LEADER 03251nam 22006855 450 001 996213701703316 005 20200629115644.0 010 $a3-319-08344-9 024 7 $a10.1007/978-3-319-08344-5 035 $a(CKB)3710000000219379 035 $a(SSID)ssj0001297118 035 $a(PQKBManifestationID)11858100 035 $a(PQKBTitleCode)TC0001297118 035 $a(PQKBWorkID)11354703 035 $a(PQKB)10648394 035 $a(DE-He213)978-3-319-08344-5 035 $a(MiAaPQ)EBC5579065 035 $a(PPN)179925482 035 $a(EXLCZ)993710000000219379 100 $a20140704d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy$b[electronic resource] $e19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /$fedited by Willy Susilo, Yi Mu 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIV, 464 p. 61 illus.) 225 1 $aSecurity and Cryptology ;$v8544 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-08343-0 320 $aIncludes bibliographic references and index. 327 $aCryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications. 330 $aThis book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications. 410 0$aSecurity and Cryptology ;$v8544 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aSusilo$b Willy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996213701703316 996 $aInformation Security and Privacy$9772014 997 $aUNISA