"synopsis" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Book Description Soft Cover. Condition: new. Seller Inventory # 9783540632320
Book Description Condition: New. Seller Inventory # ABLIING23Mar3113020172893
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9783540632320_lsuk
Book Description Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. Seller Inventory # 9783540632320
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9783540632320
Book Description Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP 97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion i. Seller Inventory # 4896250
Book Description Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. 356 pp. Englisch. Seller Inventory # 9783540632320