The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security prools; privacy prools; symmetric constructions; homomorphic encryption and obfuscation.
The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security prools; privacy prools; symmetric constructions; homomorphic encryption and obfuscation.
Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
510
Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
510Paperback(2015)
Product Details
| ISBN-13: | 9783319199610 |
|---|---|
| Publisher: | Springer International Publishing |
| Publication date: | 05/28/2015 |
| Series: | Lecture Notes in Computer Science , #9144 |
| Edition description: | 2015 |
| Pages: | 510 |
| Product dimensions: | 6.10(w) x 9.25(h) x 0.04(d) |