My Holdings   Activate Remote Access

Applied Cryptology, Cryptographic Protocols, and Computer Security Models


About this Title

Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton

Publication: Proceedings of Symposia in Applied Mathematics
Publication Year: 1983; Volume 29
ISBNs: 978-0-8218-0041-6 (print); 978-0-8218-9244-2 (online)
DOI: https://doi.org/10.1090/psapm/029
MathSciNet review: 727834

View other decades and volumes:

Table of Contents


Front/Back Matter

Articles

  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Introduction
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Cryptography
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Computer System Security Models
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Protocols and Security

View full volume PDF