Cantitate/Preț
Produs

Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings: Lecture Notes in Computer Science, cartea 9144

Editat de Ernest Foo, Douglas Stebila
en Limba Engleză Paperback – 9 iun 2015
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.
The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 34362 lei

Preț vechi: 42952 lei
-20% Nou

Puncte Express: 515

Preț estimativ în valută:
6576 6857$ 5465£

Carte tipărită la comandă

Livrare economică 20 martie-03 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319199610
ISBN-10: 3319199617
Pagini: 510
Ilustrații: XI, 510 p. 102 illus.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.73 kg
Ediția:2015
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Symmetric cryptanalysis.- Public key cryptography.- Identity-based encryption.- Digital signatures.- Security protocols.- Privacy protocols.- Symmetric constructions.- Homomorphic encryption and obfuscation.

Textul de pe ultima copertă

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.
The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.