menu
{ "item_title" : "Information Security and Privacy", "item_author" : [" Josef Pieprzyk", "Hossein Ghodosi", "Ed Dawson "], "item_description" : "Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and over the vagaries of e-commerce, you'll find few more relevant texts in the subject area. The book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. There are no fewer than 33 revised full papers presented in this volume, all of which have been carefully reviewed. They were selected from 132 submissions. The papers are organized in topical sections on, among other subjects, stream ciphers, hashing, biometrics, and secret sharing. Also covered are cryptanalysis, public key cryptography, authentication, e-commerce, and security.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/3/54/073/457/3540734570_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Information Security and Privacy|Josef Pieprzyk

Information Security and Privacy : 12th Australasian Conference, Acisp 2007, Townsville, Australia, July 2-4, 2007, Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Here is a highly relevant book that covers a wide array of key aspects in information security.

With numerous scares in recent months over the way information is stored and handled, and over the vagaries of e-commerce, you'll find few more relevant texts in the subject area.

The book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007.

There are no fewer than 33 revised full papers presented in this volume, all of which have been carefully reviewed. They were selected from 132 submissions.

The papers are organized in topical sections on, among other subjects, stream ciphers, hashing, biometrics, and secret sharing.

Also covered are cryptanalysis, public key cryptography, authentication, e-commerce, and security.

This item is Non-Returnable

Details

  • ISBN-13: 9783540734574
  • ISBN-10: 3540734570
  • Publisher: Springer
  • Publish Date: June 2007
  • Dimensions: 9.29 x 6.38 x 1.14 inches
  • Shipping Weight: 1.66 pounds
  • Page Count: 476

Related Categories

You May Also Like...

    1

BAM Customer Reviews