Languages
Pieprzyk, Josef.
Overview
| Works: | 1 works in 7 publications in 1 languages | |
|---|---|---|
Titles
Information security and privacy = 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.. Part I /
by:
Susilo, Willy.; Pieprzyk, Josef.; SpringerLink (Online service); ACISP (Conference) (2025 :)
(Electronic resources)
Cryptology and network security = 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
Pieprzyk, Josef.; Manulis, Mark.; SpringerLink (Online service); Sadeghi, Ahmad-Reza.
(Electronic resources)
Information security and privacy = 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.. Part I /
by:
Pieprzyk, Josef.; SpringerLink (Online service); ACISP (Conference) (2017 :); Suriadi, Suriadi.
(Electronic resources)
Information security and privacy = 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.. Part II /
by:
Pieprzyk, Josef.; SpringerLink (Online service); ACISP (Conference) (2017 :); Suriadi, Suriadi.
(Electronic resources)
Information security and privacy = Second Australian Conference, ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings /
by:
Mu, Yi.; Pieprzyk, Josef.; SpringerLink (Online service); Varadharajan, Vijay.; ACISP '97 ((1997 :)
(Language materials, printed)
Number-theoretic methods in cryptology = 4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24-26, 2024 : revised selected papers /
by:
Pieprzyk, Josef.; SpringerLink (Online service); NuTMiC (Conference) (2024 :); Dąbrowski, Andrzej.; Pomykała, Jacek.
(Electronic resources)
Advances in cryptology - ASIACRYPT 2008 = 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings /
by:
Pieprzyk, Josef.; SpringerLink (Online service); International Conference on the Theory and Application of Cryptology and Information Security (2008 :)
(Language materials, printed)
Topics in cryptology - CT-RSA 2010 = the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010 : proceedings /
by:
Pieprzyk, Josef.; SpringerLink (Online service); Cryptographers' Track at RSA Conference (2010 :)
(Language materials, printed)
Information security and privacy = 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.. Part II /
by:
Susilo, Willy.; Pieprzyk, Josef.; SpringerLink (Online service); NLDB (Conference) (2025 :)
(Electronic resources)
Information security = third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings /
by:
Pieprzyk, Josef.; SpringerLink (Online service); Seberry, Jennifer.; Okamoto, Eiji.; ISW 2000 ((2000 :)
(Language materials, printed)
Information security and privacy = 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.. Part III /
by:
Susilo, Willy.; Pieprzyk, Josef.; SpringerLink (Online service); ACISP (Conference) (2025 :)
(Electronic resources)
Information security and privacy = 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings /
by:
Pieprzyk, Josef.; SpringerLink (Online service); Seberry, Jennifer.; Safavi-Naini, Reihanah.; ACISP '99 ((1999 :)
(Language materials, printed)
Show more
Fewer
Subjects
Data Structures, Cryptology and Information Theory.
Software Engineering.
Mobile and Network Security.
Cryptology.
Data and Information Security.
Natural language processing (Computer science)
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Cryptography
Computing Milieux.
Blockchain.
Data encryption (Computer science)
Privacy, Right of- Congresses.
Monte Carlo method
Algorithms.
Number Theory.
Principles and Models of Security.
Computer networks- Security measures
Coding and Information Theory.
Computer security
Data Encryption.
Computers- Access control
Privacy.
Computer Science.
Computer Communication Networks.
Discrete Mathematics in Computer Science.
Systems and Data Security.
Data protection- Congresses.
Computers and Society.
Artificial intelligence.
Image processing- Digital techniques.