Cantitate/Preț
Produs

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II: Lecture Notes in Computer Science, cartea 10343

Editat de Josef Pieprzyk, Suriadi Suriadi
en Limba Engleză Paperback – 31 mai 2017
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers,  2 keynotes, 8 invited papers and 10 short papers  presented in this double volume, were carefully revised and selected from  150 submissions. The papers of Part I (LNCS 10342) are organized in topical  sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers  of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32909 lei  6-8 săpt.
  Springer International Publishing – 31 mai 2017 32909 lei  6-8 săpt.
  Springer International Publishing – 31 mai 2017 32976 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 32909 lei

Preț vechi: 41136 lei
-20% Nou

Puncte Express: 494

Preț estimativ în valută:
6298 6644$ 5249£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319598697
ISBN-10: 3319598694
Pagini: 471
Ilustrații: XVII, 471 p. 93 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Public key encryption.- Attribute-based encryption.- Identity-based encryption.- Searchable encryption.- Cryptanalysis.- Digital signatures.- Symmetric cryptography.- Software security.- Network security.- Malware detection.- Privacy.- Authentication.- Elliptic curve cryptography.

Caracteristici

Includes supplementary material: sn.pub/extras