Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings / [electronic resource] :
edited by Ernest Foo, Douglas Stebila.
- 1st ed. 2015.
- XI, 510 p. 102 illus. online resource.
- Security and Cryptology, 9144 2946-1863 ; .
- Security and Cryptology, 9144 .
Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
9783319199627
10.1007/978-3-319-19962-7 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.
QA76.9.A25
005.8
Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
9783319199627
10.1007/978-3-319-19962-7 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.
QA76.9.A25
005.8