• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Lecture Notes in Computer Science / Security and Cryptology

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC
 
Trust, Privacy and Security in Digital Business: 9th International Conference, Trustbus 2012, Vienna, Austria, September 3-7, 2012, Proceedings

Simone Fischer-H Bner; Sokratis Katsikas; Gerald Quirchmayr
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vi...
cena: 186,05
 
Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011 Revised Selected Papers

Liqun Chen; Moti Yung; Liehuang Zhu
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects,...
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Be...
cena: 202,19
 
E-Voting and Identity: Third International Conference, Voteid 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers

Aggelos Kiayias; Helger Lipmaa
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Ta...
cena: 186,05
 
Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings

Bart de Decker; David W. Chadwick
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications...
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 202,19
 
Security and Cryptography for Networks: 8th International Conference, Scn 2012, Amalfi, Italy, September 5-7, 2012, Proceedings

Ivan Visconti; Roberto De Prisco
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September ...
cena: 202,19
 
Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Pap

Angelos Keromytis
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Secu...
cena: 202,19
 
Cryptographic Hardware and Embedded Systems -- Ches 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings

Emmanuel Prouff; Patrick R. Schaumont
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and...
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Be...
cena: 202,19
 
Computer Security -- Esorics 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

Sara Foresti; Moti Yung; Fabio Martinelli
Constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
Constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.
cena: 202,19
 
Provable Security: 6th International Conference, Provsec 2012, Chengdu, China, September 26-28, 2012, Proceedings

Tsuyoshi Takagi; Guilin Wang; Zhiguang Qin
Constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
Constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012...
cena: 202,19
 
Research in Attacks, Intrusions and Defenses: 15th International Symposium, Raid 2012, Amsterdam, the Netherlands, September 12-14, 2012, Proceedings

Davide Balzarotti; Salvatore J. Stolfo; Marco Cova
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in I...
cena: 202,19
ilość książek w kategorii: 248
Pierwsza Podprzednia  13  14  15  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia