• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Jianying Zhou - książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC
 Public Key Cryptography -- Pkc 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Bao, Feng 9783540210184 Springer
Public Key Cryptography -- Pkc 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004

Bao, Feng

This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004.

The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues in public key cryptography are addressed ranging from theoretical and mathematical foundations to a broad variety of public key cryptosystems.

This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held ...

cena: 201,72
 Applied Cryptography and Network Security: 4th International Conference, Acns 2006, Singapore, June 6-9, 2006, Proceedings Zhou, Jianying 9783540347033 Springer
Applied Cryptography and Network Security: 4th International Conference, Acns 2006, Singapore, June 6-9, 2006, Proceedings

Zhou, Jianying
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore, during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This volume (LNCS 3989) contains papers presented in the academic track. ACNS was set a high standard when it was initiated in 2003. There has been a steady improvement in the quality of its program in the past 4 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York,...
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore, during June6-9,2006.ACNS 2006 brought tog...
cena: 403,47
 Secure Multi-Party Non-Repudiation Protocols and Applications Jos?? A. Onieva Javier Lopez Jianying Zhou 9780387756295 Not Avail
Secure Multi-Party Non-Repudiation Protocols and Applications

Jos?? A. Onieva Javier Lopez Jianying Zhou

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level...

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio...

cena: 403,47
 Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th Ifip Wg 11.2 International Workshop, W Ardagna, Claudio Agostino 9783642210396 Springer
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th Ifip Wg 11.2 International Workshop, W

Ardagna, Claudio Agostino
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security...
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security...
cena: 201,72
 Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings Lai, Xuejia 9783642248603 Springer
Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings

Lai, Xuejia
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in Octobe...
cena: 201,72
 Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings Bao, Feng 9783642312830 Springer
Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings

Bao, Feng
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in...
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in S...
cena: 201,72
 Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings Qing, Sihan 9783319027258 Springer
Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings

Qing, Sihan
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering...
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Be...
cena: 201,72
 Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings Huang, Xinyi 9783319063195 Springer
Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings

Huang, Xinyi
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou...
cena: 201,72
 Trust Management VIII: 8th Ifip Wg 11.11 International Conference, Ifiptm 2014, Singapore, July 7-10, 2014, Proceedings Zhou, Jianying 9783662438121 Springer
Trust Management VIII: 8th Ifip Wg 11.11 International Conference, Ifiptm 2014, Singapore, July 7-10, 2014, Proceedings

Zhou, Jianying
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, in July 2014. The 12 revised full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. In addition, the book contains one invited paper. The papers cover a wide range of topics focusing on the following main areas: trust and reputation models; privacy issues and social and behavioral models of trust; the relationship between trust and security; trust under attacks and trust in the cloud environment.
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, ...
cena: 201,72
 Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Lin, Dongdai 9783319167442 Springer
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers

Lin, Dongdai
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and...
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology,...
cena: 201,72
ilość książek w kategorii: 12
 1  2  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia