Amazon cover image
Image from Amazon.com
Image from Google Jackets

Applied cryptology, cryptographic protocols, and computer security models. [electronic resource]

Contributor(s): Material type: TextTextSeries: Proceedings of symposia in applied mathematics ; v. 29. | Proceedings of symposia in applied mathematics. AMS short course lecture notes.Publication details: Providence, R.I. : American Mathematical Society, c1983.Description: 1 online resource (xi, 192 p. : ill.)ISBN:
  • 9780821892442 (online)
Subject(s): Additional physical formats: Applied cryptology, cryptographic protocols, and computer security models.DDC classification:
  • 001.64 19
LOC classification:
  • QA76.9.A25 A66 1983
Online resources:
Contents:
Introduction / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9880 Cryptography / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9879 Computer System Security Models / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9878 Protocols and Security / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- http://www.ams.org/psapm/029 http://dx.doi.org/10.1090/psapm/029/9877
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK12296

Expanded version of notes prepared for the AMS short course entitled Cryptology in revolution, mathematics and models, held in San Francisco, Calif., Jan. 5-6, 1981, by Richard A. DeMillo and others.

Bibliography: p. 187-192.

Introduction / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- Cryptography / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- Computer System Security Models / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- Protocols and Security / Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton --

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9880

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9879

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9878

http://www.ams.org/psapm/029

http://dx.doi.org/10.1090/psapm/029/9877

Access is restricted to licensed institutions

Electronic reproduction. Providence, Rhode Island : American Mathematical Society. 2012

Mode of access : World Wide Web

Description based on print version record.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India