Cantitate/Preț
Produs

Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I: Lecture Notes in Computer Science, cartea 10342

Editat de Josef Pieprzyk, Suriadi Suriadi
en Limba Engleză Paperback – 31 mai 2017
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy,ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers,  2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I(LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.
 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32400 lei  6-8 săpt.
  Springer International Publishing – 31 mai 2017 32400 lei  6-8 săpt.
  Springer International Publishing – 31 mai 2017 32465 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 32465 lei

Preț vechi: 40581 lei
-20% Nou

Puncte Express: 487

Preț estimativ în valută:
6217 6713$ 5178£

Carte tipărită la comandă

Livrare economică 06-20 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319600543
ISBN-10: 3319600540
Pagini: 471
Ilustrații: XXIX, 471 p. 75 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.7 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Public key encryption.- Attribute-based encryption.- Identity-based encryption.- Searchable encryption.- Cryptanalysis.- Digital signatures.- Symmetriccryptography.- Software security.- Network security.- Malware detection.- Privacy.- Authentication.- Elliptic curve cryptography.

Caracteristici

Includes supplementary material: sn.pub/extras