000898955 000__ 02797cam\a2200529Ii\4500 000898955 001__ 898955 000898955 005__ 20230306150252.0 000898955 006__ m\\\\\o\\d\\\\\\\\ 000898955 007__ cr\cn\nnnunnun 000898955 008__ 190722s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000898955 020__ $$a9783030215484$$q(electronic book) 000898955 020__ $$a3030215482$$q(electronic book) 000898955 020__ $$z9783030215477 000898955 0247_ $$a10.1007/978-3-030-21548-4$$2doi 000898955 035__ $$aSP(OCoLC)on1109843694 000898955 035__ $$aSP(OCoLC)1109843694 000898955 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dDKU$$dUKMGB 000898955 049__ $$aISEA 000898955 050_4 $$aQA76.9.A25$$bA279 2019eb 000898955 08204 $$a005.8$$223 000898955 1112_ $$aACISP (Conference)$$n(24th :$$d2019 :$$cChristchurch, N.Z.) 000898955 24510 $$aInformation security and privacy :$$b24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings /$$cJulian Jang-Jaccard, Fuchun Guo (eds.). 000898955 2463_ $$aACISP 2019 000898955 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000898955 300__ $$a1 online resource (xiv, 688 pages) :$$billustrations. 000898955 336__ $$atext$$btxt$$2rdacontent 000898955 337__ $$acomputer$$bc$$2rdamedia 000898955 338__ $$aonline resource$$bcr$$2rdacarrier 000898955 4901_ $$aLecture notes in computer science ;$$v11547 000898955 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000898955 500__ $$aInternational conference proceedings. 000898955 500__ $$aIncludes author index. 000898955 506__ $$aAccess limited to authorized users. 000898955 520__ $$aThis book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography. --$$cProvided by publisher. 000898955 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 22, 2019). 000898955 650_0 $$aComputer security$$vCongresses. 000898955 650_0 $$aComputers$$xAccess control$$vCongresses. 000898955 650_0 $$aData encryption (Computer science)$$vCongresses. 000898955 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000898955 7001_ $$aJang-Jaccard, Julian,$$eeditor. 000898955 7001_ $$aGuo, Fuchun$$c(Computer scientist),$$eeditor. 000898955 830_0 $$aLecture notes in computer science ;$$v11547. 000898955 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000898955 852__ $$bebk 000898955 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-21548-4$$zOnline Access$$91397441.1 000898955 909CO $$ooai:library.usi.edu:898955$$pGLOBAL_SET 000898955 980__ $$aEBOOK 000898955 980__ $$aBIB 000898955 982__ $$aEbook 000898955 983__ $$aOnline 000898955 994__ $$a92$$bISE