×







We sell 100% Genuine & New Books only!

Information Security And Privacy: 13Th Australasian Conference Acisp 2008 Wollongong Australia July 7-9 2008 Proceedings at Meripustak

Information Security And Privacy: 13Th Australasian Conference Acisp 2008 Wollongong Australia July 7-9 2008 Proceedings by MuY. SusiloW. SeberryJ., Springer

Books from same Author: MuY. SusiloW. SeberryJ.

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 8486.00/- [ 0.00% off ]

    Seller Price: ₹ 8486.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)MuY. SusiloW. SeberryJ.
    PublisherSpringer
    EditionEdition Statement 2008 ed.
    ISBN9783540699712
    Pages480
    BindingPaperback
    LanguageEnglish
    Publish YearAugust 2008

    Description

    Springer Information Security And Privacy: 13Th Australasian Conference Acisp 2008 Wollongong Australia July 7-9 2008 Proceedings by MuY. SusiloW. SeberryJ.

    The 13Th Australasian Conference On Information Security And Privacy (Acisp 2008) Was Held At Wollongong Australia During July 7-9 2008. The Conference Was Sponsored By The Centre For Computer And Information Security Of The University Of Wollongong And The Researchnetwork For A Secure Australia. The Submission And Review Process Was Run Using The Ichair Software Written By Thomas Baigneres And Matthieu Finiasz From Epfl Lasec Switzerland. We Would Like To Thank Them For Letting Us Use Their Ichair Software. The Conferencereceived111Submissions Out Ofwhich The Programcomm- Tee Selected 33 Papers For Presentation At The Conference After A Rigorous Review Process.Thesepapersareincludedintheproceedings.Theacceptedpaperscover A Range Of Topics In Information Security Including Authentication Key M- Agement Public Key Cryptography Privacy Anonymity Secure Communication Ciphers Network Security Elliptic Curves Hash Functions And Database Security. Theconferenceproceedingscontainrevisedversionsoftheselectedpapers.Since Some Of Them Were Not Checked Again For Correctness Before Publication The - Thors Bear Full Responsibility For The Contents Of Their Papers.We Would Like To Thank The Authors Of All Papers For Submitting Their Papers To The Conference. In Addition To The Contributed Papers The Program Comprised Three Invited Talks. The Invited Speakers Were Xavier Boyen (Voltage Usa) Josef Pieprzyk (Macquarie University Australia) And Nigel Phair (Australian High Tech Crime Centre). We Would Like To Express Our Thanks To Them.Show More



    Book Successfully Added To Your Cart