The Resource Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)
Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)
Resource Information
The item Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
-
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- Annotation:
- Language
- eng
- Isbn
- 9783642314483
- Label
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Title
- Information Security and Privacy
- Title remainder
- 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
- Statement of responsibility
- edited by Willy Susilo, Yi Mu, Jennifer Seberry
- Subject
-
- Coding theory
- Computer Appl. in Administrative Data Processing
- Computer Science
- Computer Security
- Computer science
- Computers -- Access Control
- Data Encryption
- Data Protection
- Data encryption (Computer science)
- Data protection
- Information Systems
- Information systems
- Management of Computing and Information Systems
- Privacy, Right Of
- Systems and Data Security
- e-Commerce/e-business
- Coding and Information Theory
- Language
- eng
- Summary
-
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- Annotation:
- http://library.link/vocab/creatorName
- Susilo, Willy
- Dewey number
- 005.8
- LC call number
- QA76.9.A25
- http://library.link/vocab/relatedWorkOrContributorName
-
- Mu, Yi
- Seberry, Jennifer
- SpringerLink (Online service)
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 7372
- http://library.link/vocab/subjectName
-
- Computer science
- Data protection
- Data encryption (Computer science)
- Coding theory
- Information systems
- Information Systems
- Computer Science
- Systems and Data Security
- Data Encryption
- Management of Computing and Information Systems
- Coding and Information Theory
- Computer Appl. in Administrative Data Processing
- e-Commerce/e-business
- Summary expansion
- This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
- Label
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)
- Control code
- OCM1bookssj0000745998
- Dimensions
- unknown
- Isbn
- 9783642314483
- Other control number
- 10.1007/978-3-642-31448-3
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0000745998
- Label
- Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)
- Control code
- OCM1bookssj0000745998
- Dimensions
- unknown
- Isbn
- 9783642314483
- Other control number
- 10.1007/978-3-642-31448-3
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0000745998
Subject
- Coding theory
- Computer Appl. in Administrative Data Processing
- Computer Science
- Computer Security
- Computer science
- Computers -- Access Control
- Data Encryption
- Data Protection
- Data encryption (Computer science)
- Data protection
- Information Systems
- Information systems
- Management of Computing and Information Systems
- Privacy, Right Of
- Systems and Data Security
- e-Commerce/e-business
- Coding and Information Theory
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Information-Security-and-Privacy--17th/A9rD3ksAl8k/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Information-Security-and-Privacy--17th/A9rD3ksAl8k/">Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Information-Security-and-Privacy--17th/A9rD3ksAl8k/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Information-Security-and-Privacy--17th/A9rD3ksAl8k/">Information Security and Privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, edited by Willy Susilo, Yi Mu, Jennifer Seberry, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>