𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Blockchain for Information Security and Privacy

✍ Scribed by Udai Pratap Rao (editor), Piyush Kumar Shukla (editor), Chandan Trivedi (editor), Sweta Gupta (editor), Zelalem Sintayehu Shibeshi (editor)


Publisher
Auerbach Publications
Tongue
English
Leaves
441
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption.

Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace.

FEATURES

    • Applying blockchain-based secured data management in confidential cyberdefense applications

    • Securing online voting systems using blockchain

    • Safeguarding electronic healthcare record (EHR) management using blockchain

    • Impacting security and privacy in digital identity management

    • Using blockchain-based security and privacy for smart contracts

    By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

    ✦ Table of Contents


    Cover
    Half Title
    Title Page
    Copyright Page
    Table of Contents
    Preface
    Editors
    Contributors
    Chapter 1: Blockchain Impact in Education and Society
    1.1 Introduction
    1.2 Topics Covered in This Section
    1.2.1 Finding the Relevant Article
    1.3 Blockchain in Education
    1.3.1 Categories of Application
    1.3.2 Benefits
    1.3.3 Challenges Faced during the Adoption of Blockchain Technology in Education
    1.4 Discussion
    1.4.1 What Applications Have You Developed for Educational Purposes with Blockchain Technology?
    1.4.2 What Benefits Will the Technology of Blockchain Bring to Education?
    1.5 Future Research Areas
    1.6 Conclusion
    References
    Chapter 2: Apply and Analyse Several Blockchain Techniques in IoT and Big Data Sector
    2.1 Blockchain Technology
    2.1.1 Centralized, Decentralized and Distributed
    2.1.2 Types of Blockchain
    2.2 Blockchains and IoT Systems
    2.3 Blockchain IoT Platforms
    2.4 Need of IOTA
    2.5 Challenges to Address the Integration of Blockchain in IoT
    2.5.1 Scalability
    2.5.2 Security
    2.5.3 Interoperability
    2.5.4 Legal, Compliance, and Regulation
    2.6 Blockchain in IoT: Real-World Applications and Solutions
    2.6.1 Supply Chain Logistics
    2.6.2 Automotive Industry
    2.6.3 Smart Homes Industry
    2.6.4 Pharmacy Industry
    2.6.5 Mediledger
    2.7 Instances of Blockchain-Based Security Mix for IoT Systems
    2.7.1 Secure Management of IoT Devices
    2.7.2 Secure Firmware Updates in IoT Devices
    2.7.3 Trust Evaluation of a Trusted Computing Base in IoTΒ Devices
    2.7.4 IoT Device Identity Validation
    2.7.5 Secure Data Store System for Access Control Information
    2.7.6 Blockchain-Based Security Architecture for IoTΒ Devices in Smart Homes
    2.7.7 Improved Reliability of Medical IoT Devices
    2.8 Challenges and Future Research
    2.8.1 Conclusion
    2.9 Blockchain in Big Data
    2.9.1 Digital Ledger as Fulfilling Career Chances
    2.9.2 Blockchain and Big Data Advancements for Information Investigation
    2.9.3 Blockchain and Big Data: Protection Concerns
    2.9.4 Blockchain and Big Data: Community-Based Data to Forecast the Price of Bitcoin
    2.9.5 Blockchain Use Cases in Big Data
    2.10 Conclusion
    References
    Chapter 3: Blockchain:: Trends, Role and Future Prospects
    3.1 Introduction to Cryptocurrency
    3.1.1 Advantages of Cryptocurrency
    3.1.2 Disadvantages of Cryptocurrency
    3.1.3 Criticisms of Cryptocurrency
    3.1.4 Types of Cryptocurrency
    3.2 Introduction to Blockchain Technology and Structure
    3.2.1 Decentralization in Blockchain
    3.2.2 Transparency in Blockchain
    3.2.3 Types of Blockchain
    3.2.4 Need for Blockchain Technology
    3.2.5 How Does Blockchain Technology Work?
    3.2.6 Advantages and Disadvantages
    3.2.7 How to Secure Blockchain
    3.2.8 What Is Ledger and Proof of Work in Blockchain?
    3.2.9 Smart Contract (Blockchain 2.0)?
    3.3 Methods of Blockchain
    3.3.1 Application Methods for Blockchains
    3.4 Blockchain Application 3.0
    3.4.1 Blockchain in E-governance
    3.4.2 Blockchain 3.0 When Used as Discrete Office
    3.4.3 Blockchain 3.0 Technology for Health Care
    3.5 Comparisons Table of Blockchain Platforms
    3.6 Future Trends in Blockchain Technology
    3.6.1 Blockchain Testing
    3.6.2 Stop the Tendency to Centralization
    3.6.3 Big Data Analytics
    3.6.4 Artificial Intelligence
    3.7 Integration of Machine Learning in Blockchain-Based Application
    3.8 What Research Subjects Have Been Addressed in the Present Research on Blockchain?
    3.9 What Are the Present Research Holes in Blockchain Research?
    3.10 What Are the Forthcoming Research Guidelines for Blockchain?
    3.11 Conclusion
    References
    Chapter 4: Cybersecurity and Privacy Issues of Blockchain Technology
    4.1 Introduction
    4.1.1 The Basics of Cryptomonetary Forms
    4.1.2 The Significance of Money
    4.1.3 Some Digital Currency History
    4.1.4 Components of Blockchain
    4.1.4.1 Consensus
    4.1.4.2 Gamification
    4.1.4.3 Openness
    4.1.4.4 Programming Engineer
    4.1.5 The Decentralization of Blockchain
    4.1.6 Why Devolution Matters
    4.1.7 Advantages of Decentralization
    4.2 Working Principle of Blockchain
    4.2.1 Working of Blockchain
    4.2.1.1 Encryption Keys
    4.2.1.2 Transaction Process
    4.2.1.3 Hash Encryptions
    4.2.2 Action Confirmation
    4.2.3 The Structure of Blockchain
    4.2.4 Advantages of Structured Blockchain
    4.2.5 Types of Blockchain
    4.2.6 Security and Privacy Issues: Future Trends
    4.2.6.1 Learn to Do Transactions
    4.2.6.2 Cryptocurrency Institutions
    4.3 Make an Arrangement before You Jump In
    4.3.1 Challenges and Opportunity in Cyber Defense
    4.4 Case Studies
    4.4.1 Digital Forms of Money
    4.5 Interbank Compromise
    4.5.1 Keen Agreements
    4.5.2 Store Network Recognizability
    4.6 Protection Preservation Policy
    4.6.1 Privacy on Blockchain
    4.6.2 Types of Blockchain in Privacy Systems
    4.7 Conclusion
    References
    Chapter 5: Robust Digital Medical Image Watermarking and Encryption Algorithms Using Blockchain over DWT Edge Coefficient
    5.1 Introduction
    5.1.1 Secure Hash Algorithm (SHA) for Blockchain
    5.2 Medical Image Watermarking
    5.3 Previous Related Works
    5.4 Basic Transformations Used for Watermarking
    5.5 Validation of Basic Blockchain-Based Watermarking
    5.6 Proposed DWT-SVD-Based Blockchain Encrypted Watermarking
    5.7 Results
    5.8 Conclusions
    References
    Chapter 6: Enhanced Privacy and Security of Voters’ Identity in an Interplanetary File System-Based E-Voting Process
    6.1 Introduction
    6.1.1 Motivations and Goals
    6.1.2 Chapter Organization
    6.2 Literature Review
    6.3 A Proposed E-voting System in Blockchain
    6.3.1 Voter Identity Generation, Registration and Privacy Preservation before Voting
    6.3.2 Pre-voting Process, Candidate Registration, Authority Verification and Setup
    6.3.3 Voting Process – Security and Privacy Management during Voting Process
    6.3.4 Post-voting Process – Counting, Result Declaration and Identity
    6.4 System Implementation and Experimental Analysis
    6.4.1 Key Generation
    6.4.2 Candidate Registration
    6.4.3 Polling Process
    6.4.4 Counting and Results
    6.5 Analysis of Security and Privacy
    6.5.1 Security Analysis
    6.5.2 Privacy Maintenance and GDPR Compliance
    6.6 Comparisons and Results
    6.7 Conclusion and Future Work
    References
    Chapter 7: Blockchain-Enabled Secure Internet of Vehicles:: A Solution Taxonomy, Architecture, and Future Directions
    7.1 Introduction
    7.1.1 Architecture, Characteristics, and Application of IoV
    7.1.2 Platform for IoV
    7.2 The Security Aspect of IoV
    7.3 Taxonomy of IoV Attacks
    7.3.1 Authentication
    7.3.2 Attacks on Accountability
    7.4 Blockchain-Based Secured IoV Ecosystem
    7.5 Attack Countermeasures
    7.6 A Case Study on BC-Based Certificate Generation Scheme in IoV
    7.7 Research Challenges and Directions for Future Research in IoV
    7.8 Conclusion
    References
    Chapter 8: Blockchain-Based Federated Cloud Environment:: Issues and Challenges
    8.1 Introduction
    8.1.1 Contribution
    8.1.2 Chapter Layout
    8.1.3 Scope of the Survey
    8.2 Background
    8.3 BC in a Multi-Cloud Environment: A Solution Taxonomy
    8.3.1 Cloud Data Provenance
    8.3.2 Security
    8.3.2.1 Attacks in Virtual Machines
    8.3.2.2 Attacks on Virtual Machine Monitor
    8.3.2.3 Attacks in Tenant Network
    8.3.3 SLA Verification
    8.3.4 Access Control
    8.3.5 Cloud Resource Scheduling
    8.3.6 Cloud Storage Reliability
    8.3.7 Service Quality Monitoring
    8.3.8 Resource Sharing in FCE
    8.4 Open Issues and Challenges
    8.5 Conclusion
    References
    Chapter 9: Blockchain-Based Secured Data Management in Confidential Cyber Defence Applications
    9.1 Introduction
    9.2 System Overview
    9.3 Blockchain in Defence Sectors
    9.3.1 Objectives/Framework
    9.3.2 Motivation for the Work
    9.3.3 Existing Proof-of-Concept
    9.4 Requirements of a Trusted Defence System
    9.5 Type of Testing Needed for Blockchain
    9.6 Preliminary Assessment of Blockchain
    9.7 Data Manipulations in Defence Industries
    9.8 Requirements of a Reliable Defence Data-Storing Arrangement
    9.9 Proposed Architecture and Its Implementation
    9.10 Design Changes
    9.11 Acceptance Procedure
    9.12 Promoting Enigma Coding
    9.13 Methods based Evaluation and Discussion
    9.14 Needs based Evaluation and Discussion
    9.15 Challenges and Limitations
    9.16 Conclusion
    9.17 Future Work
    References
    Chapter 10: Blockchain Technology for Privacy and Security Issues and Challenges in IOT-Based Systems
    10.1 Privacy and Security Issues in IoT Systems
    10.2 Security Architecture of IoT
    10.3 Security Issues Analysis of IoT
    10.3.1 Perception Layer
    10.3.1.1 Security Issues of RFID Technology and Solutions
    10.3.1.1.1 Uniform Coding
    10.3.1.1.2 Conflict Collision
    10.3.1.1.3 RFID Privacy Protection
    10.3.1.1.4 Trust Management
    10.3.1.2 Security Issues and Technical Solutions in WSNs
    10.3.1.3 The Problems of Heterogeneous Integration
    10.3.2 Transportation Layer
    10.3.2.1 Security Issues Related to the Functional Architecture of the Transportation Layer
    10.3.2.1.1 Access Network
    10.3.2.1.2 Core Network
    10.3.2.1.3 Security Analysis in Local Area Network
    10.3.3 Application Layer
    10.3.3.1 Analyzing Security Issues in the Application Support Layer
    10.3.3.1.1 Security Threats Identified from IDC Survey
    10.3.3.1.2 Issue of Service Interruption and Attacks
    10.3.3.2 IoT Applications Security Analysis
    10.3.4 Security of IoT as a Whole
    10.4 Security Issues Comparison between IoT and a Traditional Network
    10.5 Blockchain Concepts
    10.5.1 The Structure of Blockchain
    10.5.2 The Working of Blockchain
    10.5.3 Types of Blockchain
    10.5.3.1 Public Blockchain
    10.5.3.2 Private Blockchain
    10.5.3.3 Consortium Blockchain
    10.5.3.4 Hybrid Blockchain
    10.5.4 Blockchain Solution to IoT
    10.5.4.1 Encryption and Validation
    10.5.4.2 Decentralized Database
    10.5.4.3 Private and Public Blockchain
    10.5.4.4 Immutable and Virtually Tamper-proof Network
    10.5.5 IoT Framework with Blockchain
    10.5.5.1 Physical Layer
    10.5.5.2 Communication Layer
    10.5.5.3 Database Layer
    10.5.5.4 Interface Layer
    10.5.6 Difficulties in Incorporating Blockchain with IoT
    10.6 Conclusion
    References
    Chapter 11: A Secure Online Voting System Using Blockchain
    11.1 Objective
    11.2 Introduction
    11.3 Theoretical Background
    11.3.1 Hyperledger
    11.3.2 Hyperledger Composer
    11.3.3 Electronic Voting System
    11.4 Secure Online Voting Using Blockchain
    11.4.1 Existing Voting System
    11.4.2 Proposed System
    11.4.3 Modular Design
    11.5 Implementation Methodology
    11.5.1 Peer Network
    11.5.2 Blockchain
    11.5.3 REST Server API
    11.5.4 Client-side Application
    11.6 Results and Analysis
    11.7 Conclusion and Future Work
    References
    Chapter 12: Secure Electronic Health RecordsΒ (EHR) Management Using Blockchain
    12.1 Objective of the Chapter
    12.2 Introduction
    12.2.1 Application
    12.2.2 Motivation
    12.2.3 Contribution
    12.2.4 Organization of the Chapter
    12.3 Background Study
    12.3.1 Electronic Health Records (EHR)
    12.3.2 Blockchain
    12.3.2.1 Blockchain Categorization
    12.3.2.2 Permission-less
    12.3.2.3 Permissioned
    12.3.3 Cardiology
    12.3.4 The Medical Council of India
    12.4 Secure EHR Using Blockchain
    12.4.1 Entities
    12.4.1.1 EHR Structure
    12.4.2 Architecture
    12.4.3 Working Methodology of the System
    12.4.3.1 Onboarding
    12.4.3.2 Uploading the Data
    12.4.3.3 Data Retrieval
    12.4.4 Configuration
    12.4.4.1 The Primary Nodejs Server
    12.4.4.2 The app.js
    12.4.4.3 The network.js File
    12.4.4.4 The Blockchain Server
    12.4.4.5 The EHR-contract.ts File
    12.4.5 Implementation
    12.4.5.1 User Interface
    12.5 Conclusion
    12.6 Future Work
    References
    Chapter 13: Blockchain Impact of Security and Privacy in Digital Identity Management
    13.1 Introduction to Digital Identity Management
    13.1.1 Models of DIDM
    13.1.2 Identity Issues in the Real World
    13.1.3 IDM with Blockchain Technology
    13.1.3.1 IDM Architecture
    13.1.4 Different IDM Systems
    13.1.4.1 Comparison
    13.1.5 Blockchain Impact of Security and Privacy on IDM
    13.1.6 Benefits and Challenges
    13.2 Conclusion
    References
    Chapter 14: A New Ecosystem for Digital Identity Verification Using Blockchain
    14.1 Introduction
    14.2 Background and Related Work
    14.2.1 Hashing Algorithm
    14.2.2 Blockchain and Its Applications
    14.2.3 Hyperledger Fabric Private vs Public Blockchain
    14.2.4 Related Work regarding Blockchain for KYC
    14.3 Proposed Architecture
    14.4 Implementation
    14.5 Results and Discussions
    14.5.1 Sample Block of the Hyperledger Blockchain
    14.6 Conclusion and Future Work
    References
    Chapter 15: Blockchain-Based Security and Privacy for Smart Contracts
    15.1 Introduction to Blockchain and Smart Contract
    15.1.1 Smart Contract Operating Process
    15.1.2 Security in IoT and the Impact of Blockchain-Based Smart Contracts
    15.2 Challenges and Recent Work Is Done in the Field of BC-Based SC
    15.2.1 Challenges at the Time of Creating the SCs
    15.2.1.1 Readability
    15.2.1.2 Functional Issues
    15.2.1.3 Overcharging
    15.2.2 Challenges during the Deployment Phase
    15.2.2.1 Contract Correctness
    15.2.2.2 The Dynamic Flow of Control
    15.2.3 Challenges during the Execution
    15.2.3.1 Trustworthy Oracle
    15.2.3.2 Dependency on Transaction Order
    15.2.4 Completion Challenges
    15.2.4.1 Security and Privacy
    15.2.4.2 Scams
    15.3 Applications of the SC
    15.3.1 Smart Contract in Distributed System Security
    15.3.2 Smart Contracts in the Public Sector
    15.3.3 Smart Contract in Finance
    15.3.4 Smart Contract in IoT
    15.3.5 Smart Contracts in Data Provenance
    15.3.6 Smart Contract in Sharing Economy
    15.4 A Case Study on Cloud Security Using BC-Based SC
    15.5 Conclusion
    References
    Chapter 16: Blockchain Application in Digital Identity Management in Elections
    16.1 Introduction
    16.2 Security Vulnerabilities during the Election Process
    16.3 Blockchain Solutions
    16.4 Blockchain-Based E-voting System
    16.4.1 Election as a Smart Contract
    16.4.2 Election Method
    16.5 Assessment of Blockchain as an E-voting Service
    16.6 Design and Implementation
    16.7 Conclusion
    References
    Chapter 17: Leveraging Blockchain Technology for Decentralized Domain Name Broker Service
    17.1 Introduction
    17.1.1 Application
    17.1.2 Motivation
    17.1.3 Objective
    17.1.4 Organization
    17.2 Introduction to Domain Name System
    17.2.1 Domain Names
    17.2.2 Terminologies
    17.2.3 Domain Ownership Verification
    17.2.4 Accessing Registry Data
    17.3 Background of Blockchain Technology
    17.3.1 Blockchain
    17.3.1.1 Advantages of Blockchain
    17.3.1.2 Types of Blockchain
    17.3.1.3 Smart Contract
    17.3.1.4 Consensus Protocol
    17.3.1.5 Comparison of Public Blockchain Network
    17.3.2 Detailed Comparison between Ethereum and EOS
    17.3.3 Smart Contractβ€”Security Threats
    17.3.3.1 Major Pitfalls in Smart Contract
    17.4 Current Implementation
    17.4.1 Domain Brokers
    17.4.2 Domain Transfer from One Registrant to Another
    17.4.3 A Typical (Centralized) Escrow Service
    17.4.4 Problems with Centralized Approach
    17.4.5 Related Work
    17.5 Blockchain-Based Domain Broker System
    17.5.1 Advantages
    17.5.2 Implementation
    17.5.2.1 Value Proposition of Domain Names Using Auction
    17.5.2.2 Components
    17.5.2.3 Detailed Procedure
    17.5.2.4 Actors’ Involvement
    17.6 Selection of Tools
    17.7 System Analysis and Discussion
    17.7.1 Attacks on Decentralized Components
    17.7.2 Limitations of Blockchain
    17.8 Conclusion and Open Challenges
    17.8.1 Challenges
    List of Acronyms
    References
    Chapter 18: Using Blockchain for Digital Copyrights Management
    18.1 Introduction
    18.2 The Basic Concepts and Connotation of Digital Copyright
    18.2.1 Origin of Copyright
    18.2.2 Acquisition of Copyright
    18.2.3 Digital Copyright
    18.2.3.1 Digital Works
    18.2.3.2 Digital Copyright Industry Chain
    18.3 Development Status and Problems of Digital Copyright Industry
    18.3.1 Digital Copyright Protection
    18.3.2 Problems in Digital Copyright Industry
    18.3.3 Copyright Confirmation Difficulties
    18.3.4 Difficulty in Infringement Monitoring
    18.3.5 Difficulty in Collecting Evidence
    18.3.6 Royalty Settlement Is Difficult
    18.3.7 Difficulty of Restricting Widespread Content
    18.4 Role of Blockchain to Empower Digital Copyright
    18.4.1 Establishing Ownership of Data Rights
    18.4.2 Anti-tampered, Anti-counterfeiting and Traceability
    18.4.3 Smart Contracts Ensuring Safe Transactions
    18.4.4 Infringement Evidence Consolidation
    18.4.5 Transparency of Digital Copyright Transaction Settlement
    18.5 Blockchain-Based Digital Copyright Protection Service
    18.5.1 Technical Architecture
    18.5.2 Key Technologies and Methods
    18.6 Challenges Faced by Blockchain Digital Copyright Applications
    18.6.1 Integration of Multiple Departments
    18.6.2 Interconnection of Blockchain Platforms
    18.7 The Development Trend of Blockchain Digital Copyright Applications
    18.7.1 Greater Scope for Development
    18.7.2 Rapid Development of Blockchain Digital Copyright Services
    18.8 Steps Required for Improvement
    18.8.1 Government level
    18.8.2 Enterprise level
    18.8.3 Technical level
    18.9 Conclusion
    References
    Index


    πŸ“œ SIMILAR VOLUMES


    Recent Trends in Blockchain for Informat
    ✍ Ajith Abraham, Amit Kumar Tyagi πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

    <p>Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trus

    Blockchain Cybersecurity, Trust and Priv
    ✍ Kim-Kwang Raymond Choo (editor), Ali Dehghantanha (editor), Reza M. Parizi (edit πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

    <p><span>​This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the

    Blockchain for Healthcare Systems: Chall
    ✍ Sheikh Mohammad Idrees, Parul Agarwal, M. Afshar Alam πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

    <p><strong><em>Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data</em></strong> provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues. It

    Blockchain for Healthcare Systems: Chall
    ✍ Sheikh Mohammad Idrees; Parul Agarwal; M. Afshar Alam πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

    Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues. It also provides in-depth knowle

    Blockchain Technology for IoE: Security
    ✍ Arun Solanki (editor), Anuj Kumar Singh (editor), Sudeep Tanwar (editor) πŸ“‚ Library πŸ“… 2023 πŸ› CRC Press 🌐 English

    <p><span>This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tole

    Information Security and Privacy
    ✍ Willy Susilo, Guomin Yang πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

    <p><p>This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.</p><p>The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissio