Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information Security and Privacy = 2...
~
SpringerLink (Online service)
Information Security and Privacy = 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Information Security and Privacy/ edited by Joseph K. Liu, Hui Cui.
Reminder of title:
25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /
other author:
Liu, Joseph K.
Description:
XVI, 676 p. 344 illus., 71 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-030-55304-3
ISBN:
9783030553043
Information Security and Privacy = 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /
Information Security and Privacy
25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /[electronic resource] :edited by Joseph K. Liu, Hui Cui. - 1st ed. 2020. - XVI, 676 p. 344 illus., 71 illus. in color.online resource. - Security and Cryptology ;12248. - Security and Cryptology ;9241.
Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers.
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.
ISBN: 9783030553043
Standard No.: 10.1007/978-3-030-55304-3doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information Security and Privacy = 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /
LDR
:02439nam a22004215i 4500
001
1022227
003
DE-He213
005
20200807170132.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030553043
$9
978-3-030-55304-3
024
7
$a
10.1007/978-3-030-55304-3
$2
doi
035
$a
978-3-030-55304-3
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Information Security and Privacy
$h
[electronic resource] :
$b
25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings /
$c
edited by Joseph K. Liu, Hui Cui.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XVI, 676 p. 344 illus., 71 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12248
505
0
$a
Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers.
520
$a
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Security Services.
$3
1211616
700
1
$a
Liu, Joseph K.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1110055
700
1
$a
Cui, Hui.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317920
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030553036
776
0 8
$i
Printed edition:
$z
9783030553050
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-55304-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login