Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings / [electronic resource] : edited by Ernest Foo, Douglas Stebila. - 1st ed. 2015. - XI, 510 p. 102 illus. online resource. - Security and Cryptology ; Lecture Notes in Computer Science 9144 9144 . - Security and Cryptology ; 9144 Lecture Notes in Computer Science ; 9144 .

Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital signatures -- Security protocols -- Privacy protocols -- Symmetric constructions -- Homomorphic encryption and obfuscation.

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.

9783319199627

10.1007/978-3-319-19962-7 doi


Computer security.
Data encryption (Computer science).
Management information systems.
Computer science.
Algorithms.
Systems and Data Security.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.

QA76.9.A25

005.8
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha