Listing 1 - 1 of 1 |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.
Computer security --- Congresses --- Data protection --- Privacy [Right of ] --- Privacy, Right of - Congresses. --- Computer security. --- Data encryption (Computer science). --- Computer Communication Networks. --- Computer science. --- Information Systems. --- Combinatorics. --- Systems and Data Security. --- Cryptology. --- Computers and Society. --- Management of Computing and Information Systems. --- Combinatorics --- Algebra --- Mathematical analysis --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 1 of 1 |
Sort by
|