Cantitate/Preț
Produs

Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings: Lecture Notes in Computer Science, cartea 8479

Editat de Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
en Limba Engleză Paperback – iul 2014
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32934 lei

Preț vechi: 41167 lei
-20% Nou

Puncte Express: 494

Preț estimativ în valută:
6305 6868$ 5289£

Carte tipărită la comandă

Livrare economică 19 decembrie 24 - 02 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319075358
ISBN-10: 3319075357
Pagini: 604
Ilustrații: XVIII, 586 p. 127 illus.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.84 kg
Ediția:2014
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Key exchange.- Primitive construction.- Attacks (public-key cryptography).- Hashing.- Cryptanalysis and attacks (symmetric cryptography).- Network security.- Signatures.- System security.- Secure computation.

Textul de pe ultima copertă

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.