LEADER 03949nam 22007095 450 001 996466289903316 005 20200630223441.0 010 $a3-319-60055-9 024 7 $a10.1007/978-3-319-60055-0 035 $a(CKB)4340000000061572 035 $a(DE-He213)978-3-319-60055-0 035 $a(MiAaPQ)EBC5591832 035 $a(PPN)201471531 035 $a(EXLCZ)994340000000061572 100 $a20170530d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy$b[electronic resource] $e22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3?5, 2017, Proceedings, Part I /$fedited by Josef Pieprzyk, Suriadi Suriadi 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XXIX, 471 p. 75 illus.) 225 1 $aSecurity and Cryptology ;$v10342 311 $a3-319-60054-0 320 $aIncludes bibliographical references and index. 327 $aPublic key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography. 330 $aThe two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography. . 410 0$aSecurity and Cryptology ;$v10342 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 676 $a005.8 702 $aPieprzyk$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSuriadi$b Suriadi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466289903316 996 $aInformation Security and Privacy$9772014 997 $aUNISA LEADER 00791nam--2200301---450 001 990005915820203316 005 20220601120951.0 010 $a2-7381-1669-8 035 $a000591582 035 $aUSA01000591582 035 $a(ALEPH)000591582USA01 035 $a000591582 100 $a20131210d2005----km-y0itay50------ba 101 0 $afre 102 $aFR 105 $a||||||||001yy 200 1 $aSade et la loi$fFrançois Ost 210 $aParis$cOdile Jacob$d2005 215 $a345 p.$d22 cm 700 1$aOST,$bFrançois$0406728 801 0$aIT$bsalbc$gISBD 912 $a990005915820203316 951 $aXV.4.B. 542$b237956 L.M.$cXV.4.B.$d00185519 959 $aBK 969 $aFF 979 $aMARIAS$b90$c20131210$lUSA01$h1655 996 $aSade et la loi$986869 997 $aUNISA