AMS eBook CollectionsOne of the world's most respected mathematical collections, available in digital format for your library or institution
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
About this Title
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton
Publication: Proceedings of Symposia in Applied Mathematics
Publication Year:
1983; Volume 29
ISBNs: 978-0-8218-0041-6 (print); 978-0-8218-9244-2 (online)
DOI: https://doi.org/10.1090/psapm/029
MathSciNet review: 727834
Table of Contents
Download chapters as PDF
Front/Back Matter
Articles
- Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Introduction
- Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Cryptography
- Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Computer System Security Models
- Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton – Protocols and Security