This book constitutes the refereed proceedings of the 14th International Conference on the Theory...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
InhaltsangabeTrusted third parties for secure electronic commerce - Are they needed.- Prospective...
RezensionFrom the reviews:'The goal of the book is to present the basic concepts in compu...
This book constitutes the refereed proceedings of the Third International Conference on Provable ...
InhaltsangabeCryptanalysis.- Network security.- Cryptographic protocols.- Encryption.- S-box theory.
This book presents modern concepts of computer security. It introduces the basic mathematical bac...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australias...
This volume is a collection of refereed papers presented during AUSCRYPT ''90 held in Sydney, Aus...
InhaltsangabeInvited Talk.- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3...
InhaltsangabeOverview of hash functions.- Methods of attack on hash functions.- Pseudorandomness....
AustralianComputerSociety GeneralChair: JenniferSeberry UniversityofWollongong ProgramCo-Chairs: ...