Information security and privacy : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30-December 2, 2020, Proceedings /
Saved in:
Meeting name: | ACISP (Conference) (25th : 2020 : Online) |
---|---|
Imprint: | Cham : Springer, 2020. |
Description: | 1 online resource |
Language: | English |
Series: | Lecture notes in computer science ; 12248 LNCS sublibrary: SL 4, Security and cryptology Lecture notes in computer science ; 12248. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12607114 |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | 12607114 | ||
005 | 20210813213023.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200819s2020 sz o 101 0 eng d | ||
019 | |a 1183961572 |a 1191062013 |a 1195449882 |a 1196167596 |a 1197540849 |a 1197573059 |a 1198158181 |a 1198819948 |a 1203975922 | ||
020 | |a 9783030553043 |q (electronic bk.) | ||
020 | |a 3030553043 |q (electronic bk.) | ||
020 | |z 3030553035 |q (print) | ||
020 | |z 9783030553036 |q (print) | ||
024 | 7 | |a 10.1007/978-3-030-55304-3 |2 doi | |
024 | 7 | |a 10.1007/978-3-030-55 | |
035 | |a (OCoLC)1184057003 |z (OCoLC)1183961572 |z (OCoLC)1191062013 |z (OCoLC)1195449882 |z (OCoLC)1196167596 |z (OCoLC)1197540849 |z (OCoLC)1197573059 |z (OCoLC)1198158181 |z (OCoLC)1198819948 |z (OCoLC)1203975922 | ||
035 | 9 | |a (OCLCCM-CC)1184057003 | |
037 | |b Springer | ||
040 | |a YDX |b eng |c YDX |d GW5XE |d EBLCP |d LQU |d SFB |d OCLCF |d DCT | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25 |b A279 2020eb | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a UR |2 thema | |
072 | 7 | |a UTN |2 thema | |
111 | 2 | |a ACISP (Conference) |n (25th : |d 2020 : |c Online) | |
245 | 1 | 0 | |a Information security and privacy : |b 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30-December 2, 2020, Proceedings / |c Joseph K. Liu, Hui Cui (eds.). |
246 | 3 | |a ACISP 2020 | |
260 | |a Cham : |b Springer, |c 2020. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Lecture notes in computer science ; |v 12248 | |
490 | 1 | |a LNCS sublibrary: SL 4, Security and cryptology | |
500 | |a International conference proceedings. | ||
500 | |a "This volume contains the papers presented at the 25th Australasian Conference on Information Security and Privacy (ACISP 2020), which was held as a virtual online conference, due to COVID-19."-- Preface. | ||
500 | |a Includes author index. | ||
505 | 0 | |a Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers. | |
520 | |a This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic. | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Computers |x Access control |v Congresses. | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. | |
650 | 7 | |a Computer networks |x Security measures |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Computers |x Access control |2 fast |0 (OCoLC)fst00872779 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
655 | 0 | |a Electronic books. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings |2 fast |0 (OCoLC)fst01423772 | |
700 | 1 | |a Liu, Joseph K., |e editor. |0 http://id.loc.gov/authorities/names/nb2007026087 | |
700 | 1 | |a Cui, Hui, |e editor. | |
776 | 0 | 8 | |c Original |z 3030553035 |z 9783030553036 |w (OCoLC)1161689303 |
830 | 0 | |a Lecture notes in computer science ; |v 12248. |0 http://id.loc.gov/authorities/names/n42015162 | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. |0 http://id.loc.gov/authorities/names/no2007042442 | |
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i 5e6b6576-f38e-501f-9bed-c0ddbb850b0c |s 6a3c6281-7cfc-5ce3-9bbe-e4c5700ab61f |
928 | |t Library of Congress classification |a QA76.9.A25 A279 2020eb |l Online |c UC-FullText |u https://link.springer.com/10.1007/978-3-030-55304-3 |z Springer Nature |g ebooks |i 12622722 |