000807457 000__ 02693cam\a2200481Ii\4500 000807457 001__ 807457 000807457 005__ 20210515141055.0 000807457 006__ m\\\\\o\\d\\\\\\\\ 000807457 007__ cr\cn\nnnunnun 000807457 008__ 171214s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000807457 020__ $$a9783319723594$$q(electronic book) 000807457 020__ $$a3319723596$$q(electronic book) 000807457 020__ $$z9783319723587 000807457 0247_ $$a10.1007/978-3-319-72359-4$$2doi 000807457 035__ $$a(OCoLC)on1015337608 000807457 035__ $$a(OCoLC)1015337608 000807457 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCA$$dOCLCF$$dDKU$$dUAB 000807457 049__ $$aISEA 000807457 050_4 $$aQA76.9.A25 000807457 08204 $$a005.8$$223 000807457 1112_ $$aISPEC (Conference)$$n(13th :$$d2017 :$$cMelbourne, Vic.) 000807457 24510 $$aInformation security practice and experience :$$b13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings /$$cJoseph K. Liu, Pierangela Samarati (eds.). 000807457 2463_ $$aISPEC 2017 000807457 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000807457 300__ $$a1 online resource (xvi, 907 pages) :$$billustrations. 000807457 336__ $$atext$$btxt$$2rdacontent 000807457 337__ $$acomputer$$bc$$2rdamedia 000807457 338__ $$aonline resource$$bcr$$2rdacarrier 000807457 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10701 000807457 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000807457 500__ $$aInternational conference proceedings. 000807457 500__ $$aIncludes author index. 000807457 506__ $$aAccess limited to authorized users. 000807457 520__ $$aThis book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track. 000807457 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 14, 2017). 000807457 650_0 $$aComputer security$$vCongresses. 000807457 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000807457 7001_ $$aLiu, Joseph K.,$$eeditor. 000807457 7001_ $$aSamarati, Pierangela,$$eeditor. 000807457 830_0 $$aLecture notes in computer science ;$$v10701. 000807457 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000807457 852__ $$bebk 000807457 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-72359-4$$zOnline Access 000807457 909CO $$ooai:library.usi.edu:807457$$pGLOBAL_SET 000807457 980__ $$aBIB 000807457 983__ $$aOnline 000807457 994__ $$a92$$bISE