Information Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings - Ed Dawson

Information Security and Privacy

5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings

By: Ed Dawson (Editor), Andrew Clark (Editor), Colin Boyd (Editor)

Paperback | 28 June 2000

At a Glance

Paperback


$101.07

or 4 interest-free payments of $25.27 with

 or 

Aims to ship in 7 to 10 business days

ACISP 2000, the Fifth Australasian Conference on Information Security and Privacy, was held in Brisbane, Australia, 10-12 July, 2000. The conference was sponsored by the Information Security Research Centre at Queensland Univ- sity of Technology, the Australian Computer Society, Telstra, Boeing Australia Limited, SecureGate Limited, and RSA Security Pty Ltd. We are grateful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors, and users of information security systems. The aim of the conference is to have a series of technical refereed and invited papers to discuss all di?erent aspects of information security. The program committee invited seven distinguished sp- kers: Mike Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle, John Snare, and Alan Underwood. Mike Burmester from Royal Holloway C- lege,UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri- tion"; G. R. Blakley from Texas A&M University and Bob Blakley from the IBM Tivoli Security Business Unit presented a paper entitled "All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce"; Brian Denehy from SecureGate Limited presented a paper entitled "Secure Networks or Network Security - Approaches toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap- sented a paper entitled "Perspectives on Australia's New Information Security Management Standard"; and Alan Underwood from the Australian Computer Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy Context - The Perspective of a National Computing Society". There were 81 technical papers submitted to the conference from an int- national authorship. These papers were refereed by the program committee and 37 papers were accepted for the conference.

More in Data Encryption

Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Hackers & Painters - Paul Graham

RRP $47.50

$26.50

44%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.50

$30.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $159.95

$130.75

18%
OFF
There's No Such Thing as Crypto Crime : An Investigative Handbook - Nick Furneaux
Intelligence-Driven Incident Response : Outwitting the Adversary - Rebekah Brown
Corporate Computer Security Global Edition : 4th Edition - Randall Boyle
Management of Information Security : 6th edition - Michael E. Whitman

RRP $144.95

$119.75

17%
OFF
Encyclopedia of Cyber Warfare - Paul J. Springer

RRP $260.00

$183.95

29%
OFF
The Language of Cyber Attacks : A Rhetoric of Deception - Aaron Mauro
How to Measure Anything in Cybersecurity Risk - Douglas W. Hubbard

RRP $99.95

$64.50

35%
OFF