Spedizione gratuita con Packeta per un prezzo superiore a 79.99 €
BRT 7.99 Punto BRT 7.99 DHL 7.99 HR Parcel 7.49 GLS 3.99

Information Security and Cryptology

Lingua IngleseInglese
Libro In brossura
Libro Information Security and Cryptology Moti Yung
Codice Libristo: 01649659
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International C... Descrizione completa
? points 172 b
72.67
Magazzino esterno in piccole quantità Inviamo tra 13-16 giorni

30 giorni per il reso


Potrebbe interessarti anche


I MIGLIORI
Jungle Sounds Sam Taplin / Leporello
common.buy 17.12
I MIGLIORI
BRZRKR Vol. 2 Keanu Reeves / In brossura
common.buy 16.80
I MIGLIORI
Fred Herzog Fred Herzog / Rigido
common.buy 44.30
By Sin I Rise Cora Reilly / In brossura
common.buy 17.65
I Am Here Now The Mindfulness Project / In brossura
common.buy 14.55
Fly Agaric / Rigido
common.buy 73.42
Need to Know / In brossura
common.buy 34.35
miniLÜK Michael Junga / Foglio
common.buy 8.12
No Shortcuts Jane F. McAlevey / Rigido
common.buy 79.74
Bhakti bei Vengal Chakkarai Bernhard Kirchmeier / In brossura
common.buy 44.95
Free Radicals in Biology and Environment F. Minisci / In brossura
common.buy 283.44
Poet and Other Poems. by Achsa W. Sprague. Achsa W Sprague / In brossura
common.buy 35.31
Consecutive Sudoku Puzzles - Expert 200 vol. 4 Alexander Rodriguez / In brossura
common.buy 9.41

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.§The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.

Accesso

Accedi al tuo account. Non hai ancora un account Libristo? Crealo ora!

 
obbligatorio
obbligatorio

Non hai un account? Ottieni i vantaggi di un account Libristo!

Con un account Libristo, avrai tutto sotto controllo.

Crea un account Libristo