Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please
contact your library for new procedures, specific requests, or other assistance.
LEADER 00000cam 2200721Ii 4500
001 739953391
003 OCoLC
005 20190303010003.9
006 m o d
007 cr |||||||||||
008 110708s2011 gw a ob 101 0 eng d
010 2011931295
019 765009120|a769768051|a874203088|a964891641|a1005762271
|a1066590666|a1067122671|a1081278650|a1087334850
020 9783642224973|q(electronic bk.)
020 3642224970|q(electronic bk.)
020 |z9783642224966
020 |z3642224962
024 7 10.1007/978-3-642-22497-3|2doi
035 (OCoLC)739953391|z(OCoLC)765009120|z(OCoLC)769768051
|z(OCoLC)874203088|z(OCoLC)964891641|z(OCoLC)1005762271
|z(OCoLC)1066590666|z(OCoLC)1067122671|z(OCoLC)1081278650
|z(OCoLC)1087334850
040 CUS|beng|epn|erda|cCUS|dCUS|dE7B|dC$Q|dUKMGB|dGW5XE|dCOO
|dOCLCA|dOCLCQ|dOCLCF|dBEDGE|dDKDLA|dOCLCO|dOCLCQ|dYDXCP
|dOCL|dOCLCO|dOCLCQ|dEBLCP|dOCLCQ|dVT2|dVGM|dESU|dSHS|dIOG
|dOCLCA|dCEF|dTFW|dU3W|dWYU|dYOU|dOCLCQ|dUWO|dTKN|dLEAUB
|dW2U
049 MAIN
050 4 QA76.9.A25|bA25 2011eb
072 7 COM053000|2bisacsh
072 7 URY|2bicssc
082 04 005.8|223
111 2 ACISP (Conference)|n(16th :|d2011 :|cMelbourne, Vic.)
|0http://id.loc.gov/authorities/names/nb2011020639
245 10 Information security and privacy :|b16th Australasian
conference, ACISP 2011, Melbourne, Australia, July 11-13,
2011 : proceedings /|cUdaya Parampalli, Philip Hawkes
(eds.).
246 30 ACISP 2011
264 1 Heidelberg :|bSpringer,|c2011.
300 1 online resource (xiii, 464 pages) :|billustrations.
336 text|btxt|2rdacontent
337 computer|bc|2rdamedia
338 online resource|bcr|2rdacarrier
347 text file|2rdaft|0http://rdaregistry.info/termList/
fileType/1002
490 1 Lecture notes in computer science,|x0302-9743 ;|v6812.
490 1 LNCS sublibrary. SL 4, Security and cryptology.
504 Includes bibliographical references and index.
505 2 Invited talks -- Symmetric key cryptography -- Hash
functions -- Protocols -- Access control and security --
Public key cryptography -- Posters.
520 8 Annotation This book constitutes the refereed proceedings
of the 16th Australasian Conference on Information
Security and Privacy, ACISP 2011, held in Melbourne,
Australia, in July 2011. The 24 revised full papers
presented together with an invited talk and 9 poster
papers were carefully reviewed and selected from 103
submissions. The papers are organized in topical sections
on symmetric key cryptography, hash functions,
cryptographic protocols, access control and security, and
public key cryptography.
650 0 Computer security|vCongresses.|0http://id.loc.gov/
authorities/subjects/sh2008101458
650 14 Computer Science.
650 24 Data Encryption.
650 24 Management of Computing and Information Systems.
650 24 Operating Systems.
650 24 Computer Communication Networks.
650 24 Discrete Mathematics in Computer Science.
650 24 Computer Imaging, Vision, Pattern Recognition and
Graphics.
655 0 Electronic book.
655 4 Electronic books.
655 7 Conference papers and proceedings.|2fast|0http://
id.worldcat.org/fast/1423772
655 7 Electronic books.|2lcgft
655 7 Conference papers and proceedings.|2lcgft|0http://
id.loc.gov/authorities/genreForms/gf2014026068
700 1 Parampalli, Udaya.|0http://id.loc.gov/authorities/names/
nb2011020649
700 1 Hawkes, Philip.|0http://id.loc.gov/authorities/names/
nb2010017839
776 08 |iPrint version:|tInformation Security and Privacy.
|dSpringer-Verlag New York Inc 2011|z9783642224966|w(DLC)
2011931295|w(OCoLC)733249683.
830 0 Lecture notes in computer science ;|0http://id.loc.gov/
authorities/names/n42015162|v6812.|x0302-9743.
830 0 LNCS sublibrary.|nSL 4,|pSecurity and cryptology.|0http://
id.loc.gov/authorities/names/no2007042442
990 SpringerLink|bSpringer English/International eBooks 2011 -
Full Set|c2018-10-31|yNew collection
springerlink.ebooks2011|5OH1
990 SpringerLink|bSpringer English/International eBooks 2011 -
Full Set|c2019-03-02|yMaster record variable field(s)
change: 505|5OH1