Omslagsbild från Amazon
Bild från Amazon.com

Information Security and Privacy [electronic resource] : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings / edited by Ernest Foo, Douglas Stebila.

Medverkande: Materialtyp: TextTextSerie: Lecture Notes in Computer Science ; 9144Utgivningsuppgift: Cham : Springer International Publishing : Imprint: Springer, 2015Beskrivning: XI, 510 p. 102 illus. online resourceInnehållstyp:
  • text
Medietyp:
  • computer
Bärartyp:
  • online resource
ISBN:
  • 9783319199627
Ämnen: Fler format: Printed edition:: Ingen titelDDK-klassifikation:
  • 005.8 23
Onlineresurser:
Innehåll:
Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.
I: Springer eBooksSammanfattning: This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
Inga fysiska exemplar för denna post

Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.