Librería: GuthrieBooks, Spring Branch, TX, Estados Unidos de America
EUR 6,20
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Very Good. Ex-library paperback in very good condition with the usual markings and attachments. Text block clean and unmarked. Tight binding.
Idioma: Inglés
Publicado por Springer Berlin / Heidelberg, 1999
ISBN 10: 3540657568 ISBN 13: 9783540657569
Librería: Better World Books, Mishawaka, IN, Estados Unidos de America
EUR 13,69
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 59,23
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Chiron Media, Wallingford, Reino Unido
EUR 56,68
Cantidad disponible: 10 disponibles
Añadir al carritoPF. Condición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 74,47
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 59,61
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 65,82
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong,Australia. Theconferencewassponsoredby theCentreforComputerSecurityResearch,UniversityofWollongong,andthe AustralianComputerSociety. Theaimoftheconferencewastobringtogether peopleworkingindi erentareasofcomputer,communication,andinformation securityfromuniversities,industry,andgovernmentinstitutions. Theconference gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe quicklygrowingareaofinformationsecurityandprivacy. Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose accepted, thirteen papers were from Australia, two each from Belgium and China,andoneeachfromAustria,Belarus,France,India,Japan,Korea,S in- pore,theUSA,andYugoslavia. Conferencesessionscoveredthefollowingtopics: accesscontrolandsecuritymodels,networksecurity,Booleanfunctions,group communication,cryptanalysis,keymanagementsystems,electroniccommerce, signatureschemes,RSAcryptosystems,andoddsandends. We would like to thank the members of the program committee who - nerouslyspenttheirtimereadingandevaluatingthepapers. Wewouldalsolike tothankmembersoftheorganisingcommitteeand,inparticular,ChrisCh- nes,HosseinGhodosi,MarcGysin,Tiang-BingXia,Cheng-XinQu,SanYeow Lee,YejingWang,Hua-XiongWang,Chih-HungLi,WillySusilo,ChintanShah, Je reyHorton,andGhulamRasoolChaudhryfortheircontinuousandtireless e ortinorganisingtheconference. Finally,wewouldliketothanktheauthorsof allthesubmittedpapers,especiallytheacceptedones,andalltheparticipants whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE ONINFORMATIONSECURITY ANDPRIVACY ACISP 99 Sponsoredby CenterforComputerSecurityResearch UniversityofWollongong,Australia and AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology,Australia LawrieBrown AustralianDefenceForceAcademy,Australia BillCaelli QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia CunshengDing NationalUniversityofSingapore,Singapore DieterGollmann MicrosoftResearch,UK YongfeiHan Gemplus,Singapore ThomasHardjono BayNetworks,US ErlandJonsson ChalmersUniversity,Sweden SveinKnapskog UniversityofTrondheim,Norway KeithMartin KatholiekeUniversiteitLeuven,Belgium CathyMeadows NavalResearchLaboratory,US KaisaNyberg NokiaResearchCenter,Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute,Korea DingyiPei AcademiaSinica,China SteveRoberts WithamPtyLtd,Australia ConferenceOrganization VII GregRose Qualcomm,Australia RaviSandhu GeorgeMasonUniversity,US Sta ordTavares Queen sUniversity,Canada VijayVaradharajan WesternSydneyUniversity,Australia YuliangZheng MonashUniversity,Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan,AndrewClark,andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 EnumerationofCorrelationImmuneBooleanFunctions SubhamoyMaitraandPalashSarkar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 OntheSymmetricPropertyofHomogeneousBooleanFunctions ChengxinQu,JenniferSeberry,andJosefPieprzyk. . . . . . . . . . . . . . . . . . . . . . . . 26 KeyManagement PubliclyVeri ableKeyEscrowwithLimitedTimeSpan KapaliViswanathan,ColinBoyd,andEdDawson. . . . .
Librería: preigu, Osnabrück, Alemania
EUR 50,25
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Information Security and Privacy | 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings | Josef Pieprzyk (u. a.) | Taschenbuch | xii | Englisch | 1999 | Springer | EAN 9783540657569 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, Springer Mär 1999, 1999
ISBN 10: 3540657568 ISBN 13: 9783540657569
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong,Australia. Theconferencewassponsoredby theCentreforComputerSecurityResearch,UniversityofWollongong,andthe AustralianComputerSociety. Theaimoftheconferencewastobringtogether peopleworkingindi erentareasofcomputer,communication,andinformation securityfromuniversities,industry,andgovernmentinstitutions. Theconference gavetheparticipantsanopportunitytodiscussthelatestdevelopmen tsinthe quicklygrowingareaofinformationsecurityandprivacy. Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose accepted, thirteen papers were from Australia, two each from Belgium and China,andoneeachfromAustria,Belarus,France,India,Japan,Korea,Sin- pore,theUSA,andYugoslavia. Conferencesessionscoveredthefollowingtopics: accesscontrolandsecuritymodels,networksecurity,Booleanfunctions,group communication,cryptanalysis,keymanagementsystems,electroniccommerce, signatureschemes,RSAcryptosystems,andoddsandends. We would like to thank the members of the program committee who - nerouslyspenttheirtimereadingandevaluatingthepapers. Wewouldalsolike tothankmembersoftheorganisingcommitteeand,inparticular,ChrisCh- nes,HosseinGhodosi,MarcGysin,Tiang-BingXia,Cheng-XinQu,SanYe ow Lee,YejingWang,Hua-XiongWang,Chih-HungLi,WillySusilo,ChintanShah, Je reyHorton,andGhulamRasoolChaudhryfortheircontinuousandtireless e ortinorganisingtheconference. Finally,wewouldliketothanktheauthorsof allthesubmittedpapers,especiallytheacceptedones,andalltheparticipants whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE ONINFORMATIONSECURITY ANDPRIVACY ACISP 99 Sponsoredby CenterforComputerSecurityResearch UniversityofWollongong,Australia and AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology,Australia LawrieBrown AustralianDefenceForceAcademy,Australia BillCaelli QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia CunshengDing NationalUniversityofSingapore,Singapore DieterGollmann MicrosoftResearch,UK YongfeiHan Gemplus,Singapore ThomasHardjono BayNetworks,US ErlandJonsson ChalmersUniversity,Sweden SveinKnapskog UniversityofTrondheim,Norway KeithMartin KatholiekeUniversiteitLeuven,Belgium CathyMeadows NavalResearchLaboratory,US KaisaNyberg NokiaResearchCenter,Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute,Korea DingyiPei AcademiaSinica,China SteveRoberts WithamPtyLtd,Australia ConferenceOrganization VII GregRose Qualcomm,Australia RaviSandhu GeorgeMasonUniversity,US Sta ordTavares Queen sUniversity,Canada VijayVaradharajan WesternSydneyUniversity,Australia YuliangZheng MonashUniversity,Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan,AndrewClark,andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 EnumerationofCorrelationImmuneBooleanFunctions SubhamoyMaitraandPalashSarkar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 OntheSymmetricPropertyofHomogeneousBooleanFunctions ChengxinQu,JenniferSeberry,andJosefPieprzyk. . . . . . . . . . . . . . . . . . . . . . . . 26 KeyManagement PubliclyVeri ableKeyEscrowwithLimitedTimeSpan KapaliViswanathan,ColinBoyd,andEdDawson. . . . . 348 pp. Englisch.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 1999
ISBN 10: 3540657568 ISBN 13: 9783540657569
Librería: moluna, Greven, Alemania
EUR 48,37
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlation Immune Boolean Functions.- On the Symmetric Property of Homogeneous Boolean Functions.- Key Management.- Publicly Verifiable Key Escrow with Limited Time Sp.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg Mär 1999, 1999
ISBN 10: 3540657568 ISBN 13: 9783540657569
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk UniversityofWollongong ReiSafavi-Naini UniversityofWollongong ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology,Australia LawrieBrown AustralianDefenceForceAcademy,Australia BillCaelli QueenslandUniversityofTechnology,Australia EdDawson QueenslandUniversityofTechnology,Australia CunshengDing NationalUniversityofSingapore,Singapore DieterGollmann MicrosoftResearch,UK YongfeiHan Gemplus,Singapore ThomasHardjono BayNetworks,US ErlandJonsson ChalmersUniversity,Sweden SveinKnapskog UniversityofTrondheim,Norway KeithMartin KatholiekeUniversiteitLeuven,Belgium CathyMeadows NavalResearchLaboratory,US KaisaNyberg NokiaResearchCenter,Finland Choon-SikPark ElectronicsandTelecommunicationResearchInstitute,Korea DingyiPei AcademiaSinica,China SteveRoberts WithamPtyLtd,Australia ConferenceOrganization VII GregRose Qualcomm,Australia RaviSandhu GeorgeMasonUniversity,US Sta ordTavares Queen¿sUniversity,Canada VijayVaradharajan WesternSydneyUniversity,Australia YuliangZheng MonashUniversity,Australia Referees N. Asokan ZhangJiang DingyiPei YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu ThomasHardjono Choon-SikPark YuliangZheng. TableofContents BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods WilliamMillan,AndrewClark,andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 EnumerationofCorrelationImmuneBooleanFunctions SubhamoyMaitraandPalashSarkar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 OntheSymmetricPropertyofHomogSpringer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 348 pp. Englisch.