Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005. The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions....
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | 3574 |
creator | Boyd, Colin González Nieto, Juan M |
description | This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.
The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography. |
format | Book |
fullrecord | <record><control><sourceid>proquest_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9783540316848</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3067866</sourcerecordid><originalsourceid>FETCH-LOGICAL-a4821x-6541fb6a44cdb43db4b0af3f4f278cbc37a435ed19c33bf59ea906d18090d87f3</originalsourceid><addsrcrecordid>eNo9j1FLwzAUhSOiuM39h76JD4UkN03SRy1TB4MJiq_lJk2wrjaadNP9e4sVDxwuBz7uveeEzKEQFJjUgp1OgctCKDgnMy651LSE4oIsU3qjo4BprumMZOveh_iOQxv67MnZfWyHY4Z9kz3G9oD2eEnOPHbJLf_mgrzcrZ6rh3yzvV9XN5schebsOx9vMW8kCmEbI2C0oejBC8-VtsaCQgGFa1hpAYwvSocllQ0b_6KNVh4W5HpajGnnvtJr6IZUHzpnQtilulT6v58e2auJ_Yjhc-_SUP9i1vVDxK5e3VZApdJSwg9As01R</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC3067866</pqid></control><display><type>book</type><title>Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings</title><source>Springer Books</source><creator>Boyd, Colin ; González Nieto, Juan M</creator><creatorcontrib>Boyd, Colin ; González Nieto, Juan M</creatorcontrib><description>This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.
The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography.</description><edition>2005 edition.</edition><identifier>ISBN: 3540265473</identifier><identifier>ISBN: 9783540265474</identifier><identifier>EISBN: 3540316841</identifier><identifier>EISBN: 9783540316848</identifier><identifier>OCLC: 262680935</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin / Heidelberg</publisher><subject>Computer security ; Congresses</subject><creationdate>2005</creationdate><tpages>597</tpages><format>597</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,777,781,783</link.rule.ids></links><search><creatorcontrib>Boyd, Colin</creatorcontrib><creatorcontrib>González Nieto, Juan M</creatorcontrib><title>Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings</title><description>This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.
The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography.</description><subject>Computer security</subject><subject>Congresses</subject><isbn>3540265473</isbn><isbn>9783540265474</isbn><isbn>3540316841</isbn><isbn>9783540316848</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2005</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNo9j1FLwzAUhSOiuM39h76JD4UkN03SRy1TB4MJiq_lJk2wrjaadNP9e4sVDxwuBz7uveeEzKEQFJjUgp1OgctCKDgnMy651LSE4oIsU3qjo4BprumMZOveh_iOQxv67MnZfWyHY4Z9kz3G9oD2eEnOPHbJLf_mgrzcrZ6rh3yzvV9XN5schebsOx9vMW8kCmEbI2C0oejBC8-VtsaCQgGFa1hpAYwvSocllQ0b_6KNVh4W5HpajGnnvtJr6IZUHzpnQtilulT6v58e2auJ_Yjhc-_SUP9i1vVDxK5e3VZApdJSwg9As01R</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Boyd, Colin</creator><creator>González Nieto, Juan M</creator><general>Springer Berlin / Heidelberg</general><general>Springer</general><scope/></search><sort><creationdate>2005</creationdate><title>Information Security and Privacy</title><author>Boyd, Colin ; González Nieto, Juan M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a4821x-6541fb6a44cdb43db4b0af3f4f278cbc37a435ed19c33bf59ea906d18090d87f3</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Computer security</topic><topic>Congresses</topic><toplevel>online_resources</toplevel><creatorcontrib>Boyd, Colin</creatorcontrib><creatorcontrib>González Nieto, Juan M</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Boyd, Colin</au><au>González Nieto, Juan M</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2005</date><risdate>2005</risdate><volume>3574</volume><isbn>3540265473</isbn><isbn>9783540265474</isbn><eisbn>3540316841</eisbn><eisbn>9783540316848</eisbn><abstract>This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.
The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin / Heidelberg</pub><oclcid>262680935</oclcid><tpages>597</tpages><edition>2005 edition.</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 3540265473 |
ispartof | |
issn | |
language | eng |
recordid | cdi_askewsholts_vlebooks_9783540316848 |
source | Springer Books |
subjects | Computer security Congresses |
title | Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T14%3A53%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Information%20Security%20and%20Privacy:%2010th%20Australasian%20Conference,%20ACISP%202005,%20Brisbane,%20Australia,%20July%204-6,%202005,%20Proceedings&rft.au=Boyd,%20Colin&rft.date=2005&rft.volume=3574&rft.isbn=3540265473&rft.isbn_list=9783540265474&rft_id=info:doi/&rft_dat=%3Cproquest_askew%3EEBC3067866%3C/proquest_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540316841&rft.eisbn_list=9783540316848&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3067866&rft_id=info:pmid/&rfr_iscdi=true |