Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Ergodic theory. Information theory --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Computer security --- Data encryption (Computer science). --- Information Systems. --- Computer security. --- Computer Communication Networks. --- Coding theory. --- Computer software. --- Cryptology. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Computer systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Management information systems. --- Computer science. --- Computer communication systems. --- Information theory. --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Ergodic theory. Information theory --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- informatietheorie
Listing 1 - 3 of 3 |
Sort by
|