Get Free Shipping on orders over $89
Lecture Notes in Computer Science : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings - Ed Dawson

Lecture Notes in Computer Science

5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings

By: Ed Dawson (Editor), Andrew Clark (Editor), Colin Boyd (Editor)

Paperback | 28 June 2000

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

ACISP 2000, the Fifth Australasian Conference on Information Security and Privacy, was held in Brisbane, Australia, 10-12 July, 2000. The conference was sponsored by the Information Security Research Centre at Queensland Univ- sity of Technology, the Australian Computer Society, Telstra, Boeing Australia Limited, SecureGate Limited, and RSA Security Pty Ltd. We are grateful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors, and users of information security systems. The aim of the conference is to have a series of technical refereed and invited papers to discuss all di?erent aspects of information security. The program committee invited seven distinguished sp- kers: Mike Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle, John Snare, and Alan Underwood. Mike Burmester from Royal Holloway C- lege,UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri- tion"; G. R. Blakley from Texas A&M University and Bob Blakley from the IBM Tivoli Security Business Unit presented a paper entitled "All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce"; Brian Denehy from SecureGate Limited presented a paper entitled "Secure Networks or Network Security - Approaches toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap- sented a paper entitled "Perspectives on Australia's New Information Security Management Standard"; and Alan Underwood from the Australian Computer Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy Context - The Perspective of a National Computing Society". There were 81 technical papers submitted to the conference from an int- national authorship. These papers were refereed by the program committee and 37 papers were accepted for the conference.

More in Algorithms & Data Structures

Addiction by Design : Machine Gambling in Las Vegas - Natasha Dow Schll
Python for Algorithmic Trading : From Idea to Cloud Deployment - Yves Hilpisch
Code Dependent : Living in the Shadow of AI - Madhumita Murgia

RRP $24.99

$21.75

13%
OFF
Learning Spark : Lightning-Fast Data Analytics - Brooke Wenig

RRP $152.00

$121.60

20%
OFF
Deep Learning Applications : Select Topics - Laith Abualigah

RRP $242.00

$211.75

12%
OFF
The Metaverse : Hype or Hoax? - Kapil Sharma

RRP $103.00

$91.75

11%
OFF
Mathematical Foundations of Deep Learning : Theory and Algorithms - Xiaojing Ye
Theory of Computation for Software Developers - Maxim  Mozgovoy

RRP $189.00

$167.75

11%
OFF
Fundamentals of Data Structures and Algorithms - Elvis C. Foster

RRP $380.00

$325.99

14%
OFF
Fundamentals of Data Structures and Algorithms - Elvis C. Foster

RRP $158.00

$141.75

10%
OFF