This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.In: 16th ACM CCS (2009) Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. ... In: ISDEA (2012) LifeHacker: Top 10 reasons to root your android phone, http://lifehacker.com/ top-10-reasons-to-root-your- android-phone-1079161983 Nauman, M., Khan, S., ... In: NDSS (2011) Smalley, S., Craig, R.: Security Enhanced (SE) Android: Bringing Flexible MAC to Android.
|Title||:||Information Security and Privacy|
|Author||:||Willy Susilo, Yi Mu|
|Publisher||:||Springer - 2014-07-05|