Information Security and Privacy
B2VxxQEEFIkC
494
By:"Huaxiong Wang","Josef Pieprzyk","Vijay Varadharajan"
"Business & Economics"
Published on 2004-06-25 by Springer Science & Business Media
A Generalization of PGV-Hash Functions and \u003cb\u003eSecurity\u003c/b\u003e Analysis in Black-Box \u003cbr\u003e\nModel⋆ Wonil Lee1, Mridul Nandi2, ... of Social Infrastructure Related to \u003cbr\u003e\n\u003cb\u003eInformation\u003c/b\u003e Science and \u003cb\u003eElectrical Engineering\u003c/b\u003e” of the Graduate School of \u003cbr\u003e\n\u003cb\u003eInformation\u003c/b\u003e ...
READ NOW
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization.
This Book was ranked 10 by Google Books for keyword Information Security on electrical engineering.
The book is written in enfor NOT_MATURE
Read Ebook Now
false
true
Printed Version of this book available in
BOOK
Availability of Ebook version is falsein falseor true
Public Domain Status false
Rating by
SAMPLE
false
Tidak ada komentar:
Posting Komentar