|
|
|
|
LEADER |
03494nam a2200601 4500 |
001 |
978-3-030-21548-4 |
003 |
DE-He213 |
005 |
20191021213538.0 |
007 |
cr nn 008mamaa |
008 |
190529s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030215484
|9 978-3-030-21548-4
|
024 |
7 |
|
|a 10.1007/978-3-030-21548-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security and Privacy
|h [electronic resource] :
|b 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings /
|c edited by Julian Jang-Jaccard, Fuchun Guo.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XIV, 688 p. 377 illus., 70 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11547
|
505 |
0 |
|
|a Encryption -- Post-quantum security -- Cryptocurrency related -- Foundations -- System and network security -- Symmetric cryptography.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 http://scigraph.springernature.com/things/product-market-codes/I18008
|
700 |
1 |
|
|a Jang-Jaccard, Julian.
|e editor.
|0 (orcid)0000-0002-1002-057X
|1 https://orcid.org/0000-0002-1002-057X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Guo, Fuchun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030215477
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030215491
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11547
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-21548-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|