Showing
1 - 18
results of
18
for search '
Pieprzyk, Josef
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Pieprzyk, Josef
Showing
1 - 18
results of
18
for search '
Pieprzyk, Josef
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Design of Hashing Algorithms by Josef Pieprzyk, Babak Sadeghiyan.
by
Pieprzyk, Josef
,
Sadeghiyan, Babak
Published 1993
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Fundamentals of Computer Security by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry.
by
Pieprzyk, Josef
,
Hardjono, Thomas
,
Seberry, Jennifer
Published 2003
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 3
3
Topics in Cryptology - CT-RSA 2010 The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings edited by Josef Pieprzyk.
Published 2010
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Cryptography : an introduction to computer security Jennifer Seberry, Josef Pieprzyk.
by
Seberry, Jennifer, 1944-
Published 1989
Other Authors:
“…
Pieprzyk, Josef
, 1949-…”
Call Number:
Loading…
Located:
Loading…
Book
Loading…
Save to List
Saved in:
Select result number 5
5
Advances in Cryptology - ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 200... edited by Josef Pawel Pieprzyk.
Published 2008
Other Authors:
“…
Pieprzyk, Josef
Pawel…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 6
6
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I edited by Josef Pieprzyk, Suriadi Suriadi.
Published 2017
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 7
7
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II edited by Josef Pieprzyk, Suriadi Suriadi.
Published 2017
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 8
8
Information Security and Privacy First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996, Proceedings edited by Josef Pieprzyk, Jennifer Seberry.
Published 1996
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 9
9
Advances in Cryptology - AUSCRYPT '90 International Conference on Cryptology Sydney, Australia, January 8-11, 1990 edited by Jennifer Seberry, Josef Pieprzyk.
Published 1990
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 10
10
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings edited by Josef Pawel Pieprzyk, Fangguo Zhang.
Published 2009
Other Authors:
“…
Pieprzyk, Josef
Pawel…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 11
11
Advances in Cryptology - ASIACRYPT '94 4th International Conference on the Theory and Application of Cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings edited by Josef Pieprzyk, Reihanah Safavi-Naini.
Published 1995
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 12
12
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings edited by Josef Pieprzyk, Hossein Ghodosi, Ed Dawson.
Published 2007
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 13
13
Number-Theoretic Methods in Cryptology First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers edited by Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała.
Published 2018
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 14
14
Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings edited by Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan.
Published 2004
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 15
15
Information Security and Privacy Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings edited by Vijav Varadharajan, Josef Pieprzyk, Yi Mu.
Published 1997
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 16
16
Information Security Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry.
Published 2000
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 17
17
Cryptology and Network Security 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis.
Published 2012
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 18
18
Information Security and Privacy 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry.
Published 1999
Other Authors:
“…
Pieprzyk, Josef
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Data encryption (Computer science)
Electronic resources (E-books)
Computer communication systems
Algorithms
Computer security
Computer science
Management information systems
Coding theory
Information theory
Operating systems (Computers)
Computer science—Mathematics
Computers and civilization
Data structures (Computer science)
Combinatorics
Computers
Number theory
Applied mathematics
Computer engineering
Cryptography
Discrete mathematics
Electrical engineering
Engineering mathematics
Software engineering
User interfaces (Computer systems)