Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II

Author:   Josef Pieprzyk ,  Suriadi Suriadi
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10343
ISBN:  

9783319598697


Pages:   471
Publication Date:   31 May 2017
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II


Add your own review!

Overview

The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers,  2 keynotes, 8 invited papers and 10 short papers  presented in this double volume, were carefully revised and selected from  150 submissions. The papers of Part I (LNCS 10342) are organized in topical  sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers  of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.

Full Product Details

Author:   Josef Pieprzyk ,  Suriadi Suriadi
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10343
Weight:   7.372kg
ISBN:  

9783319598697


ISBN 10:   3319598694
Pages:   471
Publication Date:   31 May 2017
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Public key encryption.- Attribute-based encryption.- Identity-based encryption.- Searchable encryption.- Cryptanalysis.- Digital signatures.- Symmetric cryptography.- Software security.- Network security.- Malware detection.- Privacy.- Authentication.- Elliptic curve cryptography.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List