Item Successfully Added to Cart
An error was encountered while trying to add the item to the cart. Please try again.
OK
Please make all selections above before adding to cart
OK
The following link can be shared to navigate to this page. You can select the link to copy or click the 'Copy To Clipboard' button below.
Copy To Clipboard
Successfully Copied!
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
 
Front Cover for Applied Cryptology, Cryptographic Protocols, and Computer Security Models
Available Formats:
Softcover ISBN: 978-0-8218-0041-6
Product Code: PSAPM/29
192 pp 
List Price: $48.00
MAA Member Price: $43.20
AMS Member Price: $38.40
Electronic ISBN: 978-0-8218-9244-2
Product Code: PSAPM/29.E
192 pp 
List Price: $45.00
MAA Member Price: $40.50
AMS Member Price: $36.00
Bundle Print and Electronic Formats and Save!
This product is available for purchase as a bundle. Purchasing as a bundle enables you to save on the electronic version.
List Price: $72.00
MAA Member Price: $64.80
AMS Member Price: $57.60
Front Cover for Applied Cryptology, Cryptographic Protocols, and Computer Security Models
Click above image for expanded view
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
Available Formats:
Softcover ISBN:  978-0-8218-0041-6
Product Code:  PSAPM/29
192 pp 
List Price: $48.00
MAA Member Price: $43.20
AMS Member Price: $38.40
Electronic ISBN:  978-0-8218-9244-2
Product Code:  PSAPM/29.E
192 pp 
List Price: $45.00
MAA Member Price: $40.50
AMS Member Price: $36.00
Bundle Print and Electronic Formats and Save!
This product is available for purchase as a bundle. Purchasing as a bundle enables you to save on the electronic version.
List Price: $72.00
MAA Member Price: $64.80
AMS Member Price: $57.60
  • Book Details
     
     
    Proceedings of Symposia in Applied Mathematics
    Volume: 291983
    MSC: Primary 68; Secondary 94;
  • Table of Contents
     
     
    • Articles
    • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Introduction
    • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Cryptography
    • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Computer System Security Models
    • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Protocols and Security
  • Request Review Copy
  • Get Permissions
Volume: 291983
MSC: Primary 68; Secondary 94;
  • Articles
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Introduction
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Cryptography
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Computer System Security Models
  • Richard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton - Protocols and Security
Please select which format for which you are requesting permissions.