000844518 000__ 02575cam\a2200541Mi\4500 000844518 001__ 844518 000844518 005__ 20230306144846.0 000844518 006__ m\\\\\o\\d\\\\\\\\ 000844518 007__ cr\nn\nnnunnun 000844518 008__ 180613s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000844518 019__ $$a1043554088$$a1043854633 000844518 020__ $$a9783319936383 000844518 020__ $$a3319936387 000844518 020__ $$z9783319936376 000844518 020__ $$z3319936379 000844518 0247_ $$a10.1007/978-3-319-93638-3$$2doi 000844518 035__ $$aSP(OCoLC)on1047679535 000844518 035__ $$aSP(OCoLC)1047679535$$z(OCoLC)1043554088$$z(OCoLC)1043854633 000844518 040__ $$aUPM$$beng$$cUPM$$dGW5XE$$dOCLCF$$dYDX 000844518 049__ $$aISEA 000844518 050_4 $$aQA76.9.A25 000844518 08204 $$a005.8$$223 000844518 24500 $$aInformation Security and Privacy :$$b23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /$$cedited by Willy Susilo, Guomin Yang. 000844518 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000844518 300__ $$a1 online resource (xv, 833 pages) :$$billustrations. 000844518 336__ $$atext$$btxt$$2rdacontent 000844518 337__ $$acomputer$$bc$$2rdamedia 000844518 338__ $$aonline resource$$bcr$$2rdacarrier 000844518 347__ $$atext file$$bPDF$$2rda 000844518 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10946 000844518 506__ $$aAccess limited to authorized users. 000844518 520__ $$aThis book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency. 000844518 650_0 $$aComputer science. 000844518 650_0 $$aComputer communication systems. 000844518 650_0 $$aComputer security. 000844518 650_0 $$aData encryption (Computer science). 000844518 650_0 $$aCoding theory. 000844518 650_0 $$aComputers and civilization. 000844518 650_0 $$aComputers. 000844518 650_0 $$aLaw and legislation. 000844518 7001_ $$aSusilo, Willy.$$eeditor. 000844518 7001_ $$aYang, Guomin.$$eeditor. 000844518 77608 $$iPrint version: $$z9783319936376 000844518 830_0 $$aLecture Notes in Computer Science ;$$v10946. 000844518 852__ $$bebk 000844518 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-93638-3$$zOnline Access$$91397441.1 000844518 909CO $$ooai:library.usi.edu:844518$$pGLOBAL_SET 000844518 980__ $$aEBOOK 000844518 980__ $$aBIB 000844518 982__ $$aEbook 000844518 983__ $$aOnline 000844518 994__ $$a92$$bISE