WorldCat Identities

Pieprzyk, Josef 1949-

Overview
Works: 105 works in 317 publications in 2 languages and 5,477 library holdings
Genres: Conference proceedings 
Roles: Editor, Creator, Other, Thesis advisor
Classifications: QA76.9.A25, 005.8
Publication Timeline
Key
Publications about  Josef Pieprzyk Publications about Josef Pieprzyk
Publications by  Josef Pieprzyk Publications by Josef Pieprzyk
Most widely held works by Josef Pieprzyk
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings by Josef Pieprzyk ( )
13 editions published in 2007 in English and held by 497 WorldCat member libraries worldwide
"This book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007, held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security."--Publisher's website
Topics in cryptology - CT-RSA 2010 the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings by Josef Pieprzyk ( )
8 editions published in 2010 in English and held by 387 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2010, CT-RSA 2010, held in San Francisco, CA, USA in April 2010. The 25 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on public-key cryptography, side-channel attacks, cryptographic protocols, cryptanalysis, and symmetric cryptography
Design of hashing algorithms by Josef Pieprzyk ( Book )
16 editions published in 1993 in English and held by 372 WorldCat member libraries worldwide
This work presents recent developments in hashing algorithm design. Hashing is the process of creating a short digest (i.e., 64 bits) for a message of arbitrary length, for exam- ple 20 Mbytes. Hashing algorithms were first used for sear- ching records in databases; they are central for digital si- gnature applications and are used for authentication without secrecy. Covering all practical and theoretical issues related to the design of secure hashing algorithms the book is self contained; it includes an extensive bibliography on the topic
Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings by Josef Pieprzyk ( Book )
17 editions published between 1999 and 2007 in English and held by 348 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP'99, held in Wollongong, NSW, Australia in April 1999. The 26 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The book is divided in topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends
Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings by Willy Susilo ( )
2 editions published in 2009 in English and held by 336 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007. The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings by Jennifer Seberry ( Book )
15 editions published in 1990 in English and held by 326 WorldCat member libraries worldwide
"This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology."--PUBLISHER'S WEBSITE
Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings by Josef Pieprzyk ( Book )
18 editions published in 1995 in English and Italian and held by 318 WorldCat member libraries worldwide
"This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms."--PUBLISHER'S WEBSITE
Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings by Josef Pieprzyk ( Book )
19 editions published in 1996 in English and held by 313 WorldCat member libraries worldwide
This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing
Cryptography : an introduction to computer security by Jennifer Seberry ( Book )
13 editions published between 1988 and 1993 in English and held by 307 WorldCat member libraries worldwide
Fundamentals of computer security by Josef Pieprzyk ( Book )
13 editions published between 2002 and 2010 in English and held by 303 WorldCat member libraries worldwide
"This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material."--BOOK JACKET
Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings by Gerhard Goos ( Book )
16 editions published in 2000 in English and held by 298 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in December 2000. The 23 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on multimedia copyright protection, e-commerce, key management, network security and access control, and cryptographic systems
Information security and privacy : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings by Huaxiong Wang ( Book )
6 editions published in 2004 in English and held by 275 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 9th Australasian Conference on Information Security and Privacy, ACISP 2004, held in Sydney, Australia in July 2004. The 41 revised full papers presented were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on broadcast encryption and traitor tracing, private information retrieval and oblivious transfer, trust and secret sharing, cryptanalysis, digital signatures, cryptosystems, fast computation, mobile agents security, protocols, security management, and access control and authorization
Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings by Josef Pieprzyk ( )
6 editions published in 2012 in English and held by 274 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory
Information security and privacy Second Australian Conference, ACISP '97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings by ACISP '97 ( )
6 editions published in 1997 in English and held by 222 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications
Information security and privacy Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 : proceedings by Vijay Varadharajan ( )
11 editions published in 1997 in English and held by 86 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications
Information security and privacy : First Australasian Conference, ACISP '96, Wollongong, NSW, Australia, June 24 - 26, 1996 ; proceedings ( Book )
3 editions published in 1996 in English and held by 61 WorldCat member libraries worldwide
Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings by Josef Pieprzyk ( )
7 editions published in 2009 in English and held by 58 WorldCat member libraries worldwide
Annotation
Information security : third international workshop ; proceedings ( Book )
3 editions published between 2000 and 2002 in English and held by 33 WorldCat member libraries worldwide
Advances in Cryptology -- ASIACRYPT'94 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings by Josef Pieprzyk ( )
3 editions published in 1995 in English and held by 32 WorldCat member libraries worldwide
This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.76 (from 0.47 for Informatio ... to 0.86 for Informatio ...)
Alternative Names
Pieprzyk, J.
Pieprzyk, J. (Josef), 1949-
Pieprzyk, Josef.
Pieprzyk, Josef P
Pieprzyk, Josef Pawel
Languages
English (212)
Italian (1)
Covers