WorldCat Identities

Pieprzyk, Josef 1949-

Overview
Works: 83 works in 371 publications in 3 languages and 6,782 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor, Other, Creator, Thesis advisor
Publication Timeline
.
Most widely held works by Josef Pieprzyk
Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings by Josef Pieprzyk( Book )

84 editions published between 1996 and 2007 in English and German and held by 877 WorldCat member libraries worldwide

"This book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007, held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security."--Publisher's website
Fundamentals of computer security by Josef Pieprzyk( Book )

15 editions published between 2003 and 2010 in English and held by 329 WorldCat member libraries worldwide

"This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material."--Jacket
Cryptography : an introduction to computer security by Jennifer Seberry( Book )

15 editions published between 1988 and 1993 in English and held by 315 WorldCat member libraries worldwide

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings by Jennifer Seberry( Book )

24 editions published in 1990 in English and Italian and held by 297 WorldCat member libraries worldwide

"This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology."--PUBLISHER'S WEBSITE
Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings by Gerhard Goos( Book )

23 editions published between 2000 and 2002 in English and held by 269 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in December 2000. The 23 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on multimedia copyright protection, e-commerce, key management, network security and access control, and cryptographic systems
Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings by Colin Boyd( Book )

20 editions published between 1997 and 1999 in English and held by 231 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997. The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications
Provable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings by Willy Susilo( Book )

14 editions published in 2009 in English and held by 59 WorldCat member libraries worldwide

Annotation
Topics in Cryptology - CT-RSA 2010 the Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings by Josef Pieprzyk( )

13 editions published in 2010 in English and held by 48 WorldCat member libraries worldwide

Annotation
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II( )

1 edition published in 2017 in English and held by 38 WorldCat member libraries worldwide

Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I( )

1 edition published in 2017 in English and held by 38 WorldCat member libraries worldwide

Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012, proceedings by Josef Pieprzyk( Book )

9 editions published in 2012 in English and held by 34 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory
Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings by Huaxiong Wang( )

2 editions published in 2004 in English and held by 29 WorldCat member libraries worldwide

Topics in cryptology the Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings( )

2 editions published in 2010 in English and held by 9 WorldCat member libraries worldwide

Information security and privacy : proceedings( )

1 edition published in 1999 in English and held by 8 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.64 (from 0.49 for Provable s ... to 0.94 for Informatio ...)

Fundamentals of computer security
Alternative Names
Josef Pieprzyk cryptographe

Josef Pieprzyk Polish cryptographer

Pieprzyk, J.

Pieprzyk, J. 1949-

Pieprzyk, J. (Josef), 1949-

Pieprzyk, Josef.

Pieprzyk, Josef P

Pieprzyk, Josef Pawel

Languages
English (224)

German (1)

Italian (1)

Covers
Fundamentals of computer securityAdvances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedingsInformation security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedingsInformation security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedingsProvable security : first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedingsTopics in Cryptology - CT-RSA 2010 the Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. ProceedingsTopics in cryptology the Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. ProceedingsInformation security and privacy : proceedingsAdvances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings