Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/61984
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brankovic, Ljiljana | en |
dc.contributor.author | Miller, Mirka | en |
dc.contributor.author | Steketee, Chris | en |
dc.date.accessioned | 2024-08-07T01:21:09Z | - |
dc.date.available | 2024-08-07T01:21:09Z | - |
dc.date.issued | 2008-11 | - |
dc.identifier.citation | Journal of Research and Practice in Information Technology, 40(4), p. 229-230 | en |
dc.identifier.issn | 2204-2326 | en |
dc.identifier.issn | 1443-458X | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/61984 | - |
dc.description.abstract | <p>This Special Collection consists of extended and/or reworked versions of selected papers presented at the Australasian Information Security Workshop (Privacy Enhancing Technologies) 2007, and at the Australasian Information Security Conference 2008. These two conferences received a total of 50 submissions, 21 of which were accepted and presented. We invited the authors of the top 50% conference papers to extend their work and submit it for publication in the JRPIT Special Collection on Privacy and Cryptography. We conducted another refereeing process, and out of the ten submissions received we accepted four high quality papers for the Special Collection on Privacy and four for this Special Collection on Security.</p> | en |
dc.language | en | en |
dc.publisher | Australian Computer Society | en |
dc.relation.ispartof | Journal of Research and Practice in Information Technology | en |
dc.title | Guest Editorial - Special Collection: Security | en |
dc.type | Journal Article | en |
local.contributor.firstname | Ljiljana | en |
local.contributor.firstname | Mirka | en |
local.contributor.firstname | Chris | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | C4 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.format.startpage | 229 | en |
local.format.endpage | 230 | en |
local.identifier.volume | 40 | en |
local.identifier.issue | 4 | en |
local.title.subtitle | Security | en |
local.contributor.lastname | Brankovic | en |
local.contributor.lastname | Miller | en |
local.contributor.lastname | Steketee | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/61984 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Guest Editorial - Special Collection | en |
local.output.categorydescription | C4 Letter of Note | en |
local.relation.url | https://50years.acs.org.au/content/dam/acs/50years/journals/jrpit/JRPIT40.4.229.pdf | en |
local.search.author | Brankovic, Ljiljana | en |
local.search.author | Miller, Mirka | en |
local.search.author | Steketee, Chris | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2008 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/79738dd8-e917-4976-9206-c53ce85039eb | en |
local.subject.for2020 | 460499 Cybersecurity and privacy not elsewhere classified | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Journal Article School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
Page view(s)
114
checked on Aug 11, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.