Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/61984
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBrankovic, Ljiljanaen
dc.contributor.authorMiller, Mirkaen
dc.contributor.authorSteketee, Chrisen
dc.date.accessioned2024-08-07T01:21:09Z-
dc.date.available2024-08-07T01:21:09Z-
dc.date.issued2008-11-
dc.identifier.citationJournal of Research and Practice in Information Technology, 40(4), p. 229-230en
dc.identifier.issn2204-2326en
dc.identifier.issn1443-458Xen
dc.identifier.urihttps://hdl.handle.net/1959.11/61984-
dc.description.abstract<p>This Special Collection consists of extended and/or reworked versions of selected papers presented at the Australasian Information Security Workshop (Privacy Enhancing Technologies) 2007, and at the Australasian Information Security Conference 2008. These two conferences received a total of 50 submissions, 21 of which were accepted and presented. We invited the authors of the top 50% conference papers to extend their work and submit it for publication in the JRPIT Special Collection on Privacy and Cryptography. We conducted another refereeing process, and out of the ten submissions received we accepted four high quality papers for the Special Collection on Privacy and four for this Special Collection on Security.</p>en
dc.languageenen
dc.publisherAustralian Computer Societyen
dc.relation.ispartofJournal of Research and Practice in Information Technologyen
dc.titleGuest Editorial - Special Collection: Securityen
dc.typeJournal Articleen
local.contributor.firstnameLjiljanaen
local.contributor.firstnameMirkaen
local.contributor.firstnameChrisen
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryC4en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.format.startpage229en
local.format.endpage230en
local.identifier.volume40en
local.identifier.issue4en
local.title.subtitleSecurityen
local.contributor.lastnameBrankovicen
local.contributor.lastnameMilleren
local.contributor.lastnameSteketeeen
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/61984en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleGuest Editorial - Special Collectionen
local.output.categorydescriptionC4 Letter of Noteen
local.relation.urlhttps://50years.acs.org.au/content/dam/acs/50years/journals/jrpit/JRPIT40.4.229.pdfen
local.search.authorBrankovic, Ljiljanaen
local.search.authorMiller, Mirkaen
local.search.authorSteketee, Chrisen
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2008en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/79738dd8-e917-4976-9206-c53ce85039eben
local.subject.for2020460499 Cybersecurity and privacy not elsewhere classifieden
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Journal Article
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

Page view(s)

114
checked on Aug 11, 2024
Google Media

Google ScholarTM

Check


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.