wyszukanych pozycji: 5
Progress on Cryptography: 25 Years of Cryptography in China
ISBN: 9781475779622 / Angielski / Miękka / 2013 / 246 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding." China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety... Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theo... |
|
cena:
390,87 zł |
Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
ISBN: 9783319547046 / Angielski / Miękka / 2017 / 544 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology,...
|
|
cena:
195,42 zł |
Progress on Cryptography: 25 Years of Cryptography in China
ISBN: 9781402079863 / Angielski / Twarda / 2004 / 246 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding." China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety... Cryptography in Chinese consists of two characters meaning "secret coded." Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theo... |
|
cena:
390,87 zł |
Information Security Practice and Experience: Second International Conference, Ispec 2006, Hangzhou, China, April 11-14, 2006, Proceedings
ISBN: 9783540330523 / Angielski / Miękka / 2006 / 392 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11 14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information security technologies become pervasive, issues pertaining to their deployment and operations are becoming increasingly imp- tant. ISPEC is an annual conference that brings together researchers and pr- titioners to provide a con?uence of new information security technologies, their applications and...
This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which too...
|
|
cena:
195,42 zł |
Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
ISBN: 9783540494621 / Angielski / Miękka / 2006 / 384 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability. This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, C... |
|
cena:
195,42 zł |