LEADER 03746nam 22006735 450 001 996418294303316 005 20200807170132.0 010 $a3-030-55304-3 024 7 $a10.1007/978-3-030-55304-3 035 $a(CKB)4100000011372968 035 $a(DE-He213)978-3-030-55304-3 035 $a(MiAaPQ)EBC6299101 035 $a(PPN)250214679 035 $a(EXLCZ)994100000011372968 100 $a20200807d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy$b[electronic resource] $e25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 ? December 2, 2020, Proceedings /$fedited by Joseph K. Liu, Hui Cui 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XVI, 676 p. 344 illus., 71 illus. in color.) 225 1 $aSecurity and Cryptology ;$v12248 311 $a3-030-55303-5 327 $aPost-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers. 330 $aThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic. 410 0$aSecurity and Cryptology ;$v12248 606 $aComputer security 606 $aComputers 606 $aComputer communication systems 606 $aComputer networks$xSecurity measures 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 615 0$aComputer security. 615 0$aComputers. 615 0$aComputer communication systems. 615 0$aComputer networks$xSecurity measures. 615 14$aSystems and Data Security. 615 24$aComputing Milieux. 615 24$aInformation Systems and Communication Service. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aSecurity Services. 676 $a005.8 702 $aLiu$b Joseph K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCui$b Hui$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418294303316 996 $aInformation Security and Privacy$9772014 997 $aUNISA