Pieprzyk, Josef.
Overview
| Works: | 1 works in 8 publications in 1 languages | |
|---|---|---|
Titles
Cryptology and network security11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings /
by:
(1998 :); Manulis, Mark.; Pieprzyk, Josef.; Sadeghi, Ahmad-Reza.; SpringerLink (Online service)
(Electronic resources)
Information security and privacy30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.Part III /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service); Susilo, Willy.
(Electronic resources)
Advances in cryptology - ASIACRYPT 200814th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service)
(Language materials, printed)
Number-theoretic methods in cryptology4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24-26, 2024 : revised selected papers /
by:
(1998 :); Dąbrowski, Andrzej.; Pieprzyk, Josef.; Pomykała, Jacek.; SpringerLink (Online service)
(Electronic resources)
Information security and privacy30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.Part II /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service); Susilo, Willy.
(Electronic resources)
Information security and privacy30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.Part I /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service); Susilo, Willy.
(Electronic resources)
Information securitythird international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings /
by:
(1998 :); Okamoto, Eiji.; Pieprzyk, Josef.; Seberry, Jennifer.; SpringerLink (Online service)
(Electronic resources)
Information security and privacy4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings /
by:
(1998 :); Pieprzyk, Josef.; Safavi-Naini, Reihanah.; Seberry, Jennifer.; SpringerLink (Online service)
(Electronic resources)
Information security and privacy22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.Part I /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service); Suriadi, Suriadi.
(Electronic resources)
Information security and privacy22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017 : proceedings.Part II /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service); Suriadi, Suriadi.
(Electronic resources)
Information security and privacySecond Australian Conference, ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings /
by:
(1998 :); Mu, Yi.; Pieprzyk, Josef.; SpringerLink (Online service); Varadharajan, Vijay.
(Electronic resources)
Topics in cryptology - CT-RSA 2010the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010 : proceedings /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service)
(Electronic resources)
Number-theoretic methods in cryptologyfirst International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017 : revised selected papers /
by:
(1998 :); Kaczorowski, Jerzy.; Pieprzyk, Josef.; Pomykala, Jacek.; SpringerLink (Online service)
(Electronic resources)
Provable securitythird international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /
by:
(1998 :); Pieprzyk, Josef.; SpringerLink (Online service); Zhang, Fangguo.
(Electronic resources)
Show more
Fewer
Subjects
Data Structures, Cryptology and Information Theory.
Software Engineering.
Mobile and Network Security.
Data protection
Cryptology.
Software Engineering/Programming and Operating Systems.
Data and Information Security.
Natural language processing (Computer science)
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Cryptography
Computing Milieux.
Blockchain.
Data encryption (Computer science)
Monte Carlo method
Algorithms.
Number Theory.
Principles and Models of Security.
Coding and Information Theory.
Computer security
Data Encryption.
Privacy, Right of
Privacy.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Discrete Mathematics in Computer Science.
Computers
Computer networks
Computers and Society.
Symbolic and Algebraic Manipulation.
Artificial intelligence.
Image processing