Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /

Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings / [electronic resource] : edited by Ernest Foo, Douglas Stebila. - 1st ed. 2015. - XI, 510 p. 102 illus. online resource. - Security and Cryptology, 9144 2946-1863 ; . - Security and Cryptology, 9144 .

Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.

9783319199627

10.1007/978-3-319-19962-7 doi


Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in