Sold Out
Book Categories |
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? | 1 | |
Privacy and Security Policy Choices in an NII Environment | 20 | |
Commercial Key Escrow: An Australian Perspective | 40 | |
Encryption and the Global Information Infrastructure: An Australian Perspective | 65 | |
Crypto in Europe - Markets, Law and Policy | 75 | |
Saving Dollars Makes Sense of Crypto Export Controls | 90 | |
A Proposed Architecture for Trusted Third Party Services | 98 | |
A New Key Escrow Cryptosystem | 105 | |
How to Fairly Reconstruct a Shared Secret | 115 | |
A Note on Nonuniform Decimation of Periodic Sequences | 125 | |
Randomness Measures Related to Subset Occurrence | 132 | |
Low Order Approximation of Cipher Functions | 144 | |
Multiple Encryption with Minimum Key | 156 | |
A One-Key Cryptosystem Based on a Finite Nonlinear Automaton | 165 | |
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps | 174 | |
Discrete Optimisation and Fast Correlation Attacks | 186 | |
Keyed Hash Functions | 201 | |
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation | 215 | |
Cryptanalysis of the Enhanced ElGamal's Signature Scheme | 228 | |
Access with Pseudonyms | 232 | |
A New Identification Algorithm | 244 | |
Public-key Cryptography on Smart Cards | 250 | |
Integrating Smart Cards Into Authentication Systems | 270 | |
Smart Card with Interferometric Quantum Cryptography Device | 282 | |
Cryptographic APIs | 290 | |
Foiling Active Network Impersonation Attacks Made in Collusion with an Insider | 301 | |
The CASS Shell | 313 | |
Authors Index | 327 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionCryptography: Policy and Algorithms
X
This Item is in Your InventoryCryptography: Policy and Algorithms
X
You must be logged in to review the productsX
X
X
Add Cryptography: Policy and Algorithms, This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headl, Cryptography: Policy and Algorithms to the inventory that you are selling on WonderClubX
X
Add Cryptography: Policy and Algorithms, This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headl, Cryptography: Policy and Algorithms to your collection on WonderClub |