FEEDBACK Smiley face
Normal view MARC view ISBD view

Information Security and Privacy [electronic resource] :16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings /

Contributor(s): Parampalli, Udaya [editor.] | Hawkes, Philip [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6812Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011.Description: XIII, 464 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642224973.Subject(s): Computer science | Computer communication systems | Operating systems (Computers) | Data encryption (Computer science) | Computer science -- Mathematics | Computer graphics | Management information systems | Computer Science | Data Encryption | Management of Computing and Information Systems | Operating Systems | Computer Communication Networks | Discrete Mathematics in Computer Science | Computer Imaging, Vision, Pattern Recognition and GraphicsOnline resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in