• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Lecture Notes in Computer Science / Security and Cryptology

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC
 
Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers

Gildas Avoine; Orhun Kara
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in G...
cena: 186,05
 
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding

Benedikt Gierlichs; Sylvain Guilley; Debdeep Mukhopadhyay
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in...
cena: 186,05
 
Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings

Willy Susilo; Reza Reyhanitabar
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in Oc...
cena: 202,19
 
Research in Attacks, Intrusions, and Defenses: 16th International Symposium, Raid 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings

Salvatore Stolfo; Angelos Stavrou; Charles Wright
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in I...
cena: 202,19
 
Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings

Feng Bao; Pierangela Samarati; Jianying Zhou
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in...
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in S...
cena: 202,19
 
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings

Aikaterini Mitrokotsa; Serge Vaudenay
Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012.
Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACR...
cena: 202,19
 
Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings

Willy Susilo; Yi Mu; Jennifer Seberry
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong...
cena: 202,19
 
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings

Simone Fischer-H Bner; Matthew Wright
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012.
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 201...
cena: 202,19
 
Intelligence and Security Informatics: Pacific Asia Workshop, Paisi 2011, Beijing, China, July 9, 2011. Proceedings

Michael Chau; G. Alan Wang; Xiaolong Zheng
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011. The 8 revised full papers and the 5 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis; intelligence analysis and knowledge discovery; information access and security; and infectious disease informatics.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, Chi...
cena: 202,19
 
Information Security and Cryptology - Icisc 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

Howon Kim
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and...
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held...
cena: 202,19
ilość książek w kategorii: 248
Pierwsza Podprzednia  13  14  15  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia