Skip to Main Content


AMS eBook CollectionsOne of the world's most respected mathematical collections, available in digital format for your library or institution


Applied Cryptology, Cryptographic Protocols, and Computer Security Models

About this Title

Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton

Publication: Proceedings of Symposia in Applied Mathematics
Publication Year: 1983; Volume 29
ISBNs: 978-0-8218-0041-6 (print); 978-0-8218-9244-2 (online)
DOI: https://doi.org/10.1090/psapm/029
MathSciNet review: 727834

PDF View full volume as PDF

View other decades and volumes:

Table of Contents

PDF Download chapters as PDF

Front/Back Matter

Articles

  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Introduction
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Cryptography
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Computer System Security Models
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Protocols and Security