This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and Privacy, ACISP 2006, held in Melbourne, Australia, July 2006. The book presents 35 revised full papers and 1 invited paper, organized in topical sections on stream ciphers, symmetric key ciphers, network security, cryptographic applications, secure implementation, signatures, theory, security applications, provable security, protocols, as well as hashing and message authentication.
Imprint | Springer-Verlag |
Country of origin | Germany |
Series | Lecture Notes in Computer Science, 4058 |
Release date | June 2006 |
Availability | Expected to ship within 10 - 15 working days |
First published | 2006 |
Editors | Lynn Batten, Reihaneh Safavi-Naini |
Dimensions | 235 x 155 x 23mm (L x W x T) |
Format | Paperback |
Pages | 446 |
Edition | 2006 ed. |
ISBN-13 | 978-3-540-35458-1 |
Barcode | 9783540354581 |
Categories | |
LSN | 3-540-35458-1 |