Applied Cryptography and Network Security
Editat de Feng Bao, Pierangela Samarati, Jianying Zhouen Limba Engleză Paperback – 19 iun 2012
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Preț: 337.30 lei
Preț vechi: 421.62 lei
-20%
Puncte Express: 506
Preț estimativ în valută:
59.60€ • 69.08$ • 51.97£
59.60€ • 69.08$ • 51.97£
Carte tipărită la comandă
Livrare economică 15-29 mai
Specificații
ISBN-13: 9783642312830
ISBN-10: 3642312837
Pagini: 596
Ilustrații: XIV, 580 p. 107 illus.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.89 kg
Ediția:2012
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642312837
Pagini: 596
Ilustrații: XIV, 580 p. 107 illus.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.89 kg
Ediția:2012
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchTextul de pe ultima copertă
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Caracteristici
Fast track conference proceedings Unique visibility State of the art research