• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Yuliang Zheng - książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown Zheng, Yuliang 9783540001713 Springer
Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown

Zheng, Yuliang

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures,...

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Secu...

cena: 201,72
 Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1 Imai, Hideki 9783540656449 Springer
Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1

Imai, Hideki
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field...
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in...
cena: 201,72
 Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, Pkc 2000, Melbourne, Victoria, Austra Imai, Hideki 9783540669678 Springer
Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, Pkc 2000, Melbourne, Victoria, Austra

Imai, Hideki
This text constitutes the refereed proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, held in Melbourne, Victoria, Australia, in January 2000. The 31 revised full papers presented were carefully reviewed and selected from 70 submissions. Among the topics addressed are: cryptographic protocols; digital signature schemes; elliptic curve cryptography; discrete logarithm; authentication; encryption protocols; key recovery; time stamping; shared cryptography; certification; zero-knowledge proofs; auction protocols; and mobile communications...
This text constitutes the refereed proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, held i...
cena: 201,72
 Advances in Cryptology - Auscrypt '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December Seberry, Jennifer 9783540572206 Springer
Advances in Cryptology - Auscrypt '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December

Seberry, Jennifer
This volume contains the proceedings of an international conference on cryptologic research, covering various aspects of communications security, including authentication, cryptanalysis, cryptographic protocols, digital signatures, the design of block ciphers, pseudo-random sequences and more.
This volume contains the proceedings of an international conference on cryptologic research, covering various aspects of communications security, incl...
cena: 201,72
 Information Security: 7th International Conference, Isc 2004, Palo Alto, Ca, Usa, September 27-29, 2004, Proceedings Zhang, Kan 9783540232087 Springer
Information Security: 7th International Conference, Isc 2004, Palo Alto, Ca, Usa, September 27-29, 2004, Proceedings

Zhang, Kan
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would...
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature o...
cena: 201,72
 Practical Signcryption Alexander W. Dent Yuliang Zheng Moti Yung 9783540894094 Not Avail
Practical Signcryption

Alexander W. Dent Yuliang Zheng Moti Yung
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features...
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...
cena: 403,47
 Tunable Multiband Ferroelectric Devices for Reconfigurable Rf-Frontends Zheng, Yuliang 9783642357794 Springer
Tunable Multiband Ferroelectric Devices for Reconfigurable Rf-Frontends

Zheng, Yuliang
This book surveys adapted technologies of material synthesis, film deposition and multilayer circuitry, plus tunable multiband antennas, tunable impedance matching networks and tunable integrated waveguide filters built on low-cost ferroelectric thick-films.
This book surveys adapted technologies of material synthesis, film deposition and multilayer circuitry, plus tunable multiband antennas, tunable imped...
cena: 403,47
 Practical Signcryption Alexander W. Dent Yuliang Zheng Moti Yung 9783642265938 Springer
Practical Signcryption

Alexander W. Dent Yuliang Zheng Moti Yung
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features...
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...
cena: 403,47


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia