• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Lecture Notes in Computer Science / Security and Cryptology

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC
 
Cryptology and Network Security: 13th International Conference, Cans 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

Dimitris Gritzalis; Aggelos Kiayias; Ioannis Askoxylakis
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, ...
cena: 201,24
 
Provable Security: 8th International Conference, Provsec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

Sherman S. M. Chow; Joseph K. Liu; Lucas C. K. Hui
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in Sept...
cena: 201,24
 
Decision and Game Theory for Security: 5th International Conference, Gamesec 2014, Los Angeles, Ca, Usa, November 6-7, 2014, Proceedings

Radha Poovendran; Walid Saad

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.

The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and...

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in ...

cena: 201,24
 
Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings

Willi Meier; Debdeep Mukhopadhyay
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, ...
cena: 201,24
 
Selected Areas in Cryptography -- Sac 2014: 21st International Conference, Montreal, Qc, Canada, August 14-15, 2014, Revised Selected Papers

Antoine Joux; Amr Youssef
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and...
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, ...
cena: 201,24
 
Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 2014, Revised Selected

Nitesh Saxena; Ahmad-Reza Sadeghi
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The ...
cena: 193,23
 
Security Protocols XXII: 22nd International Workshop, Cambridge, Uk, March 19-21, 2014, Revised Selected Papers

Vashek Matya; Petr Venda; Bruce Christianson

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014.After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy."

"

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge...

cena: 201,24
 
Information Security: 17th International Conference, Isc 2014, Hong Kong, China, October 12-14, 2014, Proceedings

Sherman S. M. Chow; Jan Camenisch; Lucas C. K. Hui

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android...

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in...

cena: 201,24
 
Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers

Dongdai Lin; Shouhuai Xu; Moti Yung

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013.

The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system...

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptolog...

cena: 201,24
 
Secure and Trustworthy Service Composition: The Aniketos Approach

Achim Brucker; Fabiano Dalpiaz; Paolo Giorgini

The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing.

This state-of-the-art survey illustrates the results of the Aniketos - Secure and Trustworthy Composite Services - project (funded under...

The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for devel...

cena: 193,23
ilość książek w kategorii: 248
Pierwsza Podprzednia  22  23  24  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia