The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.
The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II
eBook(1st ed. 2017)
Related collections and offers
Product Details
ISBN-13: | 9783319598703 |
---|---|
Publisher: | Springer-Verlag New York, LLC |
Publication date: | 05/26/2017 |
Series: | Lecture Notes in Computer Science , #10343 |
Sold by: | Barnes & Noble |
Format: | eBook |
File size: | 12 MB |
Note: | This product may take a few minutes to download. |