Item Successfully Added to Cart
An error was encountered while trying to add the item to the cart. Please try again.
Please make all selections above before adding to cart
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
Edited by:
Richard A. Demillo
Softcover ISBN: | 978-0-8218-0041-6 |
Product Code: | PSAPM/29 |
List Price: | $125.00 |
MAA Member Price: | $112.50 |
AMS Member Price: | $100.00 |
eBook ISBN: | 978-0-8218-9244-2 |
Product Code: | PSAPM/29.E |
List Price: | $99.00 |
MAA Member Price: | $89.10 |
AMS Member Price: | $79.20 |
Softcover ISBN: | 978-0-8218-0041-6 |
eBook: ISBN: | 978-0-8218-9244-2 |
Product Code: | PSAPM/29.B |
List Price: | $224.00 $174.50 |
MAA Member Price: | $201.60 $157.05 |
AMS Member Price: | $179.20 $139.60 |
Click above image for expanded view
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
Edited by:
Richard A. Demillo
Softcover ISBN: | 978-0-8218-0041-6 |
Product Code: | PSAPM/29 |
List Price: | $125.00 |
MAA Member Price: | $112.50 |
AMS Member Price: | $100.00 |
eBook ISBN: | 978-0-8218-9244-2 |
Product Code: | PSAPM/29.E |
List Price: | $99.00 |
MAA Member Price: | $89.10 |
AMS Member Price: | $79.20 |
Softcover ISBN: | 978-0-8218-0041-6 |
eBook ISBN: | 978-0-8218-9244-2 |
Product Code: | PSAPM/29.B |
List Price: | $224.00 $174.50 |
MAA Member Price: | $201.60 $157.05 |
AMS Member Price: | $179.20 $139.60 |
-
Book DetailsProceedings of Symposia in Applied MathematicsVolume: 29; 1983; 192 ppMSC: Primary 68; Secondary 94
-
Table of Contents
-
Articles
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Introduction
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Cryptography
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Computer System Security Models
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Protocols and Security
-
-
RequestsReview Copy – for publishers of book reviewsPermission – for use of book, eBook, or Journal contentAccessibility – to request an alternate format of an AMS title
- Book Details
- Table of Contents
- Requests
Volume: 29; 1983; 192 pp
MSC: Primary 68; Secondary 94
-
Articles
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Introduction
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Cryptography
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Computer System Security Models
-
Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton — Protocols and Security
Review Copy – for publishers of book reviews
Permission – for use of book, eBook, or Journal content
Accessibility – to request an alternate format of an AMS title
Please select which format for which you are requesting permissions.