WorldCat Identities

Pieprzyk, Josef 1949-

Overview
Works: 84 works in 372 publications in 2 languages and 6,907 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor, Other, Creator, Thesis advisor
Publication Timeline
.
Most widely held works by Josef Pieprzyk
Fundamentals of computer security by Josef Pieprzyk( Book )

15 editions published between 2003 and 2010 in English and held by 330 WorldCat member libraries worldwide

"This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material."--Jacket
Cryptography : an introduction to computer security by Jennifer Seberry( Book )

15 editions published between 1988 and 1993 in English and held by 311 WorldCat member libraries worldwide

Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings by Jennifer Seberry( Book )

24 editions published in 1990 in English and Italian and held by 298 WorldCat member libraries worldwide

"This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology."--PUBLISHER'S WEBSITE
Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings by Colin Boyd( Book )

20 editions published between 1997 and 1999 in English and held by 230 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005. The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography
Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings by ACISP 2004( Book )

16 editions published in 2004 in English and held by 169 WorldCat member libraries worldwide

The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by the Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The - viewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia,?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication
Advances in cryptology--ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings by Josef Pieprzyk( Book )

20 editions published in 2008 in English and Undetermined and held by 58 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers
Topics in Cryptology - CT-RSA 2010 the Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings by Josef Pieprzyk( )

13 editions published in 2010 in English and held by 49 WorldCat member libraries worldwide

Annotation
Information Security and Privacy 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings by Huaxiong Wang( )

2 editions published in 2004 in English and held by 30 WorldCat member libraries worldwide

Information security and privacy : 12th Australasian conference ; proceedings( )

3 editions published between 1996 and 2007 in English and held by 10 WorldCat member libraries worldwide

Information security and privacy : proceedings( )

1 edition published in 1999 in English and held by 8 WorldCat member libraries worldwide

Information Security and Privacy 22nd Australasian Conference, Acisp 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings by ACISP (Conference)( Book )

6 editions published in 2017 in English and held by 6 WorldCat member libraries worldwide

The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography
Topics in cryptology proceedings( Book )

2 editions published in 2010 in English and held by 2 WorldCat member libraries worldwide

Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings by George Davida( Book )

1 edition published in 2001 in English and held by 0 WorldCat member libraries worldwide

The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Málaga, Spain, on October 1-3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier López and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. José M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Maña, Carlos Maraval, Juan J. Ortega, José M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Università di Milano; G.R
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.64 (from 0.51 for Topics in ... to 0.94 for Informatio ...)

WorldCat IdentitiesRelated Identities
Fundamentals of computer security
Alternative Names
Josef Pieprzyk cryptographe

Josef Pieprzyk Polish cryptographer

Pieprzyk, J.

Pieprzyk, J. 1949-

Pieprzyk, J. (Josef), 1949-

Pieprzyk, Josef.

Pieprzyk, Josef P

Pieprzyk, Josef Pawel

Languages
English (137)

Italian (1)

Covers
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedingsInformation security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedingsInformation security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedingsAdvances in cryptology--ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedingsTopics in Cryptology - CT-RSA 2010 the Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. ProceedingsInformation security and privacy : 12th Australasian conference ; proceedingsInformation security and privacy : proceedingsTopics in cryptology proceedingsInformation security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings