Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Computer networks --- Computers --- Computer security --- Public key cryptography --- Réseaux d'ordinateurs --- Sécurité informatique --- Cryptographie à clé publique --- Security measures --- Access control --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- -681.3*D46 --- 005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer security. --- Réseaux d'ordinateurs --- Sécurité informatique --- Cryptographie à clé publique --- Sécurité --- 681.3*D46 --- Computer network security --- Network security, Computer --- Security of computer networks
Choose an application
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001. The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Computer Science --- Engineering & Applied Sciences --- Access control --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Congrès --- Accès --- Contrôle --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Operating Systems. --- Management of Computing and Information Systems. --- Cryptography --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer operating systems --- Disk operating systems --- Systems software --- Operating systems --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Distributed processing --- Foundations --- Computer networks. --- Operating systems (Computers)
Listing 1 - 2 of 2 |
Sort by
|