Cantitate/Preț
Produs

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II: Lecture Notes in Computer Science, cartea 10343

Editat de Josef Pieprzyk, Suriadi Suriadi
en Limba Engleză Paperback – 31 mai 2017
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers,  2 keynotes, 8 invited papers and 10 short papers  presented in this double volume, were carefully revised and selected from  150 submissions. The papers of Part I (LNCS 10342) are organized in topical  sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers  of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 34195 lei  6-8 săpt.
  Springer International Publishing – 31 mai 2017 34195 lei  6-8 săpt.
  Springer International Publishing – 31 mai 2017 34265 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 34195 lei

Preț vechi: 42744 lei
-20% Nou

Puncte Express: 513

Preț estimativ în valută:
6543 6832$ 5415£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319598697
ISBN-10: 3319598694
Pagini: 471
Ilustrații: XVII, 471 p. 93 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Public key encryption.- Attribute-based encryption.- Identity-based encryption.- Searchable encryption.- Cryptanalysis.- Digital signatures.- Symmetric cryptography.- Software security.- Network security.- Malware detection.- Privacy.- Authentication.- Elliptic curve cryptography.

Caracteristici

Includes supplementary material: sn.pub/extras