LEADER 03908nam 22007935 450 001 996465509003316 005 20200630033302.0 010 $a3-642-22497-0 024 7 $a10.1007/978-3-642-22497-3 035 $a(CKB)2670000000095968 035 $a(SSID)ssj0000537915 035 $a(PQKBManifestationID)11335182 035 $a(PQKBTitleCode)TC0000537915 035 $a(PQKBWorkID)10556896 035 $a(PQKB)10150753 035 $a(DE-He213)978-3-642-22497-3 035 $a(MiAaPQ)EBC3066950 035 $a(PPN)156311828 035 $a(EXLCZ)992670000000095968 100 $a20110702d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy$b[electronic resource] $e16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings /$fedited by Udaya Parampalli, Philip Hawkes 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIII, 464 p.) 225 1 $aSecurity and Cryptology ;$v6812 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-22496-2 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography. 410 0$aSecurity and Cryptology ;$v6812 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aComputer communication systems 606 $aComputer science?Mathematics 606 $aOptical data processing 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 0$aComputer communication systems. 615 0$aComputer science?Mathematics. 615 0$aOptical data processing. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 615 24$aComputer Communication Networks. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a005.82 702 $aParampalli$b Udaya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHawkes$b Philip$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aACISP (Conference) 906 $aBOOK 912 $a996465509003316 996 $aInformation Security and Privacy$9772014 997 $aUNISA