LEADER 03957nam 22008175 450 001 996465758903316 005 20200704015824.0 010 $a3-642-31448-1 024 7 $a10.1007/978-3-642-31448-3 035 $a(CKB)3400000000085758 035 $a(SSID)ssj0000745998 035 $a(PQKBManifestationID)11430129 035 $a(PQKBTitleCode)TC0000745998 035 $a(PQKBWorkID)10859568 035 $a(PQKB)10153906 035 $a(DE-He213)978-3-642-31448-3 035 $a(MiAaPQ)EBC3069927 035 $a(PPN)16831939X 035 $a(EXLCZ)993400000000085758 100 $a20120704d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy$b[electronic resource] $e17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /$fedited by Willy Susilo, Yi Mu, Jennifer Seberry 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIV, 460 p. 46 illus.) 225 1 $aSecurity and Cryptology ;$v7372 300 $aInternational conference proceedings. 311 $a3-642-31447-3 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography. 410 0$aSecurity and Cryptology ;$v7372 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aCoding theory 606 $aInformation theory 606 $aApplication software 606 $aE-commerce 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aApplication software. 615 0$aE-commerce. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aCoding and Information Theory. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$ae-Commerce/e-business. 676 $a005.8 702 $aSusilo$b Willy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSeberry$b Jennifer$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465758903316 996 $aInformation Security and Privacy$9772014 997 $aUNISA