LEADER 03873nam 22007335 450 001 996465739703316 005 20200705093658.0 010 $a3-319-72359-6 024 7 $a10.1007/978-3-319-72359-4 035 $a(CKB)4100000001381784 035 $a(DE-He213)978-3-319-72359-4 035 $a(MiAaPQ)EBC6281025 035 $a(MiAaPQ)EBC5590970 035 $a(Au-PeEL)EBL5590970 035 $a(OCoLC)1015337608 035 $a(PPN)222227893 035 $a(EXLCZ)994100000001381784 100 $a20171208d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Practice and Experience$b[electronic resource] $e13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13?15, 2017, Proceedings /$fedited by Joseph K. Liu, Pierangela Samarati 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVI, 907 p. 211 illus.) 225 1 $aSecurity and Cryptology ;$v10701 311 $a3-319-72358-8 327 $aBlockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.-  SocialSec track. 330 $aThis book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track. 410 0$aSecurity and Cryptology ;$v10701 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aLiu$b Joseph K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465739703316 996 $aInformation Security Practice and Experience$9772300 997 $aUNISA