Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/797
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSusilo, Willy. ;en_US
dc.contributor.authorYang, Guomin. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:13Z-
dc.date.available2020-05-17T08:22:13Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319936383 ;en_US
dc.identifier.isbn9783319936376 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/797-
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319936376. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency. ;en_US
dc.description.statementofresponsibilityedited by Willy Susilo, Guomin Yang.en_US
dc.format.extentXV, 833 p. 127 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10946. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10946. ;en_US
dc.relation.haspart9783319936376.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectCoding and Information Theory. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectComputer Communication Networksen_US
dc.titleInformation Security and Privacyen_US
dc.title.alternative23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319936376.pdf23.57 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSusilo, Willy. ;en_US
dc.contributor.authorYang, Guomin. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:13Z-
dc.date.available2020-05-17T08:22:13Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319936383 ;en_US
dc.identifier.isbn9783319936376 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/797-
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319936376. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency. ;en_US
dc.description.statementofresponsibilityedited by Willy Susilo, Guomin Yang.en_US
dc.format.extentXV, 833 p. 127 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10946. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10946. ;en_US
dc.relation.haspart9783319936376.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectCoding and Information Theory. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectComputer Communication Networksen_US
dc.titleInformation Security and Privacyen_US
dc.title.alternative23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319936376.pdf23.57 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSusilo, Willy. ;en_US
dc.contributor.authorYang, Guomin. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:13Z-
dc.date.available2020-05-17T08:22:13Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319936383 ;en_US
dc.identifier.isbn9783319936376 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/797-
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319936376. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency. ;en_US
dc.description.statementofresponsibilityedited by Willy Susilo, Guomin Yang.en_US
dc.format.extentXV, 833 p. 127 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10946. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10946. ;en_US
dc.relation.haspart9783319936376.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectCoding and Information Theory. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectComputer Communication Networksen_US
dc.titleInformation Security and Privacyen_US
dc.title.alternative23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319936376.pdf23.57 MBAdobe PDFThumbnail
Preview File