Cantitate/Preț
Produs

Applied Cryptography and Network Security: Lecture Notes in Computer Science, cartea 8479

Editat de Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
en Limba Engleză Paperback – iul 2014
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33772 lei

Preț vechi: 42214 lei
-20%

Puncte Express: 507

Preț estimativ în valută:
5967 6872$ 5165£

Carte tipărită la comandă

Livrare economică 11-25 mai


Specificații

ISBN-13: 9783319075358
ISBN-10: 3319075357
Pagini: 604
Ilustrații: XVIII, 586 p. 127 illus.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.9 kg
Ediția:2014
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Key exchange.- Primitive construction.- Attacks (public-key cryptography).- Hashing.- Cryptanalysis and attacks (symmetric cryptography).- Network security.- Signatures.- System security.- Secure computation.

Textul de pe ultima copertă

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.