Information security and privacy : 26th Australasian Conference, ACISP 2021, Virtual event, December 1-3, 2021, Proceedings / Joonsang Baek, Sushmita Ruj (eds.).
2021
QA76.9.A25 A279 2021eb
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Information security and privacy : 26th Australasian Conference, ACISP 2021, Virtual event, December 1-3, 2021, Proceedings / Joonsang Baek, Sushmita Ruj (eds.).
Meeting Name
ISBN
9783030905675 (electronic bk.)
3030905675 (electronic bk.)
9783030905668
3030905667
3030905675 (electronic bk.)
9783030905668
3030905667
Published
Cham : Springer, 2021.
Language
English
Description
1 online resource (xiv, 716 pages) : illustrations (some color).
Item Number
10.1007/978-3-030-90567-5 doi
Call Number
QA76.9.A25 A279 2021eb
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021. The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
Note
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed November 9, 2021).
Added Author
Series
Lecture notes in computer science ; 13083.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
Cryptographic Foundations
Symmetric Primitives
Encryption
Privacy
Blockchain
Protocols and Foundations
Blockchain
Analysis and Attack
Machine Learning for Privacy
Machine Learning
Analysis and Attack
Post Quantum Cryptography
Encryption
Post Quantum Cryptography
Authentication.
Symmetric Primitives
Encryption
Privacy
Blockchain
Protocols and Foundations
Blockchain
Analysis and Attack
Machine Learning for Privacy
Machine Learning
Analysis and Attack
Post Quantum Cryptography
Encryption
Post Quantum Cryptography
Authentication.