42,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
  • Broschiertes Buch

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Produktbeschreibung
Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Here is a highly relevant book that covers a wide array of key aspects in information security.

With numerous scares in recent months over the way information is stored and handled, and over the vagaries of e-commerce, you'll find few more relevant texts in the subject area.

The book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007.

There are no fewer than 33 revised full papers presented in this volume, all of which have been carefully reviewed. They were selected from 132 submissions.

The papers are organized in topical sections on, among other subjects, stream ciphers, hashing, biometrics, and secret sharing.

Also covered are cryptanalysis, public key cryptography, authentication, e-commerce, and security.