Narrow your search

Library

EhB (2)

VUB (2)

AP (1)

KDG (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

More...

Resource type

book (3)

digital (1)


Language

English (3)


Year
From To Submit

2008 (3)

Listing 1 - 3 of 3
Sort by

Multi
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
Authors: --- ---
ISBN: 9783540705000 Year: 2008 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.


Book
Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings
Authors: --- --- ---
ISBN: 3540705007 3540699716 Year: 2008 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.

Keywords

Computer security --- Data encryption (Computer science). --- Information Systems. --- Computer security. --- Computer Communication Networks. --- Coding theory. --- Computer software. --- Cryptology. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Software, Computer --- Computer systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Management information systems. --- Computer science. --- Computer communication systems. --- Information theory. --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems


Book
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings
Authors: --- --- ---
ISBN: 9783540705000 Year: 2008 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.

Listing 1 - 3 of 3
Sort by