Cantitate/Preț
Produs

Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I: Lecture Notes in Computer Science, cartea 11442

Editat de Dongdai Lin, Kazue Sako
en Limba Engleză Paperback – 6 apr 2019
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 49972 lei  3-5 săpt. +4007 lei  5-11 zile
  Springer International Publishing – 6 apr 2019 49972 lei  3-5 săpt. +4007 lei  5-11 zile
  Springer International Publishing – 6 apr 2019 58031 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 49972 lei

Preț vechi: 58791 lei
-15% Nou

Puncte Express: 750

Preț estimativ în valută:
8844 10372$ 7754£

Carte disponibilă

Livrare economică 05-19 ianuarie 26
Livrare express 20-26 decembrie pentru 5006 lei

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030172527
ISBN-10: 303017252X
Pagini: 597
Ilustrații: XVII, 614 p. 926 illus., 13 illus. in color.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 0.88 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.