Ebook: Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings
Author: Adrian Spalka Armin B. Cremers Hartmut Lehmler (auth.) E. P. Dawson A. Clark Colin Boyd (eds.)
- Genre: Computers
- Tags: Data Encryption, Management of Computing and Information Systems, Computer Communication Networks, Operating Systems, Algorithm Analysis and Problem Complexity
- Series: Lecture Notes in Computer Science 1841
- Year: 2000
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000.
The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a total of 81 submissions. The book offers topical sections on network security, public key cryptography, cryptographic implementation issues, electronic commerce, key recovery, public key infrastructure, Boolean functions, intrusion detection, codes, digital signatures, secret sharing, and protocols.
Download the book Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)