Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- -Cryptography --- -681.3*E3 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Sécurité informatique --- Congrès --- Protection of computer systems --- Protection --- 681.3*E3 --- Computer security - Congresses. --- Cryptography - Congresses.
Choose an application
Computers --- Access control --- Congresses --- Cryptography
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.
Computer security --- Congresses --- Data protection --- Privacy [Right of ] --- Privacy, Right of - Congresses. --- Computer security. --- Data encryption (Computer science). --- Computer Communication Networks. --- Computer science. --- Information Systems. --- Combinatorics. --- Systems and Data Security. --- Cryptology. --- Computers and Society. --- Management of Computing and Information Systems. --- Combinatorics --- Algebra --- Mathematical analysis --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 3 of 3 |
Sort by
|