This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confe...
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confe...
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Confe...
This book presents modern concepts of computer security. It introduces the basic mathematical bac...
This book constitutes the refereed proceedings of the Second Australasian Conference on Informati...
This book constitutes the refereed post-conference proceedings of the First International Confer...
This book presents modern concepts of computer security. It introduces the basic mathematical bac...
This book constitutes the refereed proceedings of the 14th International Conference on the Theory...
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydn...
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial rol...
The third International Workshop on Information Security was held at the U- versity of Wollongong...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology...
This book constitutes the thoroughly refereed post-conference proceedings of the First Australias...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Aust...
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of particip...
This book constitutes the refereed proceedings of the Third International Conference on Provable ...
Here is a highly relevant book that covers a wide array of key aspects in information security. I...
This work presents recent developments in hashing algorithmdesign. Hashing is the process of crea...
The4thAustralasianConferenceonInformationSecurityandPrivacywasheld attheUniversityofWollongong,Au...
This book constitutes the refereed post-conference proceedings of the 4th International Conferenc...