Information security and privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings
This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005. The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions....
Saved in:
| Main Authors | , , |
|---|---|
| Format | eBook Book |
| Language | English |
| Published |
Berlin
Springer
2005
Springer Berlin / Heidelberg |
| Edition | 1 |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3540265473 9783540265474 |
Cover
| Abstract | This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.
The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography. |
|---|---|
| AbstractList | This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.
The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography. |
| Author | Boyd, Colin González Nieto, Juan M. ACISP |
| Author_xml | – sequence: 1 fullname: ACISP – sequence: 2 fullname: Boyd, Colin – sequence: 3 fullname: González Nieto, Juan M. |
| BackLink | https://cir.nii.ac.jp/crid/1130282272529991296$$DView record in CiNii |
| BookMark | eNo9kE1v2zAMhjV0Ldp0-Q86FCgKJIA-bEnsLTWyLkOADdiwqyHLVKPGlVPL6ZbLfnudeBgPJEg8eF-SE_IxthE_kInMMya5Mhk_Gxuh8kzLczIRjOUgjNRwQa6EEsowkPklmab0zIaQ3AjDrsjfVfRt92L70Eaa0O270B-ojTXddeHNugO9p5z1G7rYp76zjU3BRlq00WOH0eGMLorVj-_06DejD11IlY3H6YgHO6Nf982BZnM1O0GD3q5rHWId4lP6RM69bRJO_9Vr8uvz8mfxZb7-9rgqFuu5zbTJ_swFh9qjyVWFwGqujXa6qivQCgVoqAEkSPS89sx7J7Vm1gh0yuTe-rwCeU3uRmGbtvg7bdqmT-Vbg1XbblMJ2vx_pRnY25EdFn3dY-rLE-YwHk8qlw-FZEobpQbyZiRjCKULx8y5ZMIIoUUuAIALUPIdNnd5ZQ |
| ContentType | eBook Book |
| DBID | RYH |
| DEWEY | 005.8 |
| DatabaseName | CiNii Complete |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Mathematics |
| EISBN | 3540316841 9783540316848 |
| Edition | 1 2005 edition. |
| ExternalDocumentID | 9783540316848 EBC3067866 BA72623636 |
| GroupedDBID | 089 0D6 0DA 2HV 38. 6NX A4J AABBV AABSQ AAIER AAJYQ AATVQ AAUKK ABBRO ABBUY ABBVZ ABCYT ABMNI ACDTA ACDUY AEDXK AEHEY AEJLV AEKFX AETDV AEVYL AEZAY AFUVA AHNNE ALMA_UNASSIGNED_HOLDINGS ATJMZ AZZ BBABE CZZ E6I IEZ IV- LTD MA. MW~ NUD RYH SBO SUFPE SVJCK TPJZQ TSXQS UR3 Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z88 LDH SAO |
| ID | FETCH-LOGICAL-a4784x-219dfe856be90d1787c7bdb976e2979d99393ef1df0ffc3770a82ec685faf5b93 |
| ISBN | 3540265473 9783540265474 |
| IngestDate | Fri Nov 08 03:52:13 EST 2024 Fri May 30 21:51:26 EDT 2025 Fri Jun 27 00:41:52 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2005928379 |
| LCCallNum_Ident | QA268 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a4784x-219dfe856be90d1787c7bdb976e2979d99393ef1df0ffc3770a82ec685faf5b93 |
| Notes | Includes bibliographical references and index |
| OCLC | 262680935 |
| PQID | EBC3067866 |
| PageCount | 597 |
| ParticipantIDs | askewsholts_vlebooks_9783540316848 proquest_ebookcentral_EBC3067866 nii_cinii_1130282272529991296 |
| PublicationCentury | 2000 |
| PublicationDate | c2005 2005 2005-08-15 |
| PublicationDateYYYYMMDD | 2005-01-01 2005-08-15 |
| PublicationDate_xml | – year: 2005 text: c2005 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin |
| PublicationPlace_xml | – name: Berlin – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationYear | 2005 |
| Publisher | Springer Springer Berlin / Heidelberg |
| Publisher_xml | – name: Springer – name: Springer Berlin / Heidelberg |
| SSID | ssj0000318280 |
| Score | 1.9029942 |
| Snippet | This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia... |
| SourceID | askewsholts proquest nii |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Computer security Congresses |
| TableOfContents | Intro -- Preface -- Table of Contents -- Author Index |
| Title | Information security and privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings |
| URI | https://cir.nii.ac.jp/crid/1130282272529991296 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=3067866 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783540316848 |
| Volume | 3574 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEBbNlkJz6Ztu2xRReosdZNmS7N6SZUsa2lJoGnIzli3BkuCFrhOaPeS3Z0Yry05aKO1FeI13DvMJzTcvDSHvGdNZYSsW12kuYjj9WFw1isVAjYTmVovK3a7_5as8_JEdnYrTYYSq6y7p9F69_mNfyf-gCu8AV-yS_Qdkg1B4Ac-AL6yAMKx3yG_42Reeh6bD3ZWfQOdb_heXOMDdOfoMMzLjXsmhvW9z6-Kn79_wSkGxARncPV_4GgIgvoP6ajeLJT7jx072YPcCJ3figne_vHJbZ4YzgUKNz7Jdu8R8cm7WsAdNt0n7XGDCaO9W_EHciT_08cdbfikGkziONc4GMxOK_w72FQfSJVO5RbaUAo_5_v786PNJCI3hOcNz5jtxnJz0QQhSbeRuk-1qdQZ2AGxEtwJi0C4Wv5lTxxGOH5MJ9o08IfdM-5Q86qdlUH94PiPXI9BoDxoF0KgHjX6gCBkdQ0YHyCLqNExROxHt4YpoACuiCBUFqCL3EcgbwfScnHycH88OYz_9Iq4ylWe_YrAljTW5kNoUrEngZK2VbjTwR8MLVTTALIvU2KSxzNo6VYpVOTe1zIWtrNBF-oJM2mVrXhKqE20aIyyQU5s1tdXKIFEH8pimVkgzJe9G2iwvz12mflV6leNwsyyfkh1QclkvcE0w4Q3kUnHB0cfghZwS2qu_dP_35cXl_GCGjmku5au_iHhNHg5b7A2ZdD8vzA6Qvk6_9ZvkBg9nTWg |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Information+security+and+privacy+%3A+10th+Australasian+Conference%2C+ACISP+2005%2C+Brisbane%2C+Australia%2C+July+4-6%2C+2005+%3A+proceedings&rft.au=ACISP&rft.au=Boyd%2C+Colin&rft.au=Gonz%C3%A1lez+Nieto%2C+Juan+M.&rft.date=2005-01-01&rft.pub=Springer&rft.isbn=9783540265474&rft.externalDocID=BA72623636 |
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97835403%2F9783540316848.jpg |