Information Security and Privacy

21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security and Privacy by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319402536
Publisher: Springer International Publishing Publication: June 29, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319402536
Publisher: Springer International Publishing
Publication: June 29, 2016
Imprint: Springer
Language: English

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

More books from Springer International Publishing

Cover of the book Artificial Intelligence in Education by
Cover of the book Orthogeriatrics by
Cover of the book European Perspectives on Behavioural Law and Economics by
Cover of the book Square Matrices of Order 2 by
Cover of the book Europe and the End of the Age of Innocence by
Cover of the book Finite Volumes for Complex Applications VIII - Hyperbolic, Elliptic and Parabolic Problems by
Cover of the book Yeasts in Natural Ecosystems: Diversity by
Cover of the book Foundation Mathematics for Computer Science by
Cover of the book Ecology and Conservation of Birds in Urban Environments by
Cover of the book Reconstruction, Identification and Implementation Methods for Spiking Neural Circuits by
Cover of the book Aviation and International Cooperation by
Cover of the book Essentials of Partial Differential Equations by
Cover of the book Double Enumeration of Legislative Powers in a Sub-State Context by
Cover of the book Computational Data and Social Networks by
Cover of the book Jews in Medieval England by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy