About these proceedings
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
access control authentication data security information key escrow network security security security protocols
Springer-Verlag Berlin Heidelberg 1997
Springer, Berlin, Heidelberg
Springer Book Archive
Series Print ISSN
Series Online ISSN
Buy this book on publisher's site