Information Security and Privacy

22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II

Conference proceedings ACISP 2017
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10343)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Symmetric Cryptography

    1. Front Matter
      Pages 1-1
    2. Sumanta Sarkar, Habeeb Syed
      Pages 3-18
    3. Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
      Pages 19-37
  3. Software Security

    1. Front Matter
      Pages 59-59
    2. Fan Jiang, Cen Zhang, Shaoyin Cheng
      Pages 61-79
    3. Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu
      Pages 80-94
    4. Yan Lin, Xiaoxiao Tang, Debin Gao
      Pages 95-112
  4. Network Security

    1. Front Matter
      Pages 113-113
    2. Weizhong Qiang, JiaZhen Guo, Hai Jin, Weifeng Li
      Pages 135-150
  5. Malware Detection

    1. Front Matter
      Pages 151-151
    2. Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu
      Pages 153-172
    3. Ying Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang et al.
      Pages 173-189
  6. Privacy

    1. Front Matter
      Pages 191-191
    2. Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, Ye Wang
      Pages 214-234
    3. Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Su Peng
      Pages 235-248

Other volumes

  1. 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I
  2. Information Security and Privacy
    22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II

About these proceedings

Introduction

The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017.

The 45 revised full papers,  2 keynotes, 8 invited papers and 10 short papers  presented in this double volume, were carefully revised and selected from  150 submissions. The papers of Part I (LNCS 10342) are organized in topical  sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers  of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.

Keywords

cloud services security cryptography mathematical foundations of cryptography security engineering social aspects of security and privacy biometrics bitcoin cyber-physical system database security embedded security system formal methods hash functions mobile platform security network security outsourcing of computation privacy-preserving protocols public key cryptography storage security symmetric cryptography vulnerability management

Editors and affiliations

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-59870-3
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-59869-7
  • Online ISBN 978-3-319-59870-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book