pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
SECOND INTERNATIONAL CONFERENCE, ACNS 2004, YELLOW MOUNTAIN, CHINA, JUNE 8-11, 2004, PROCEEDINGS
By: Markus Jakobsson (Editor), Moti Yung (Editor), Jianying Zhou (Editor)
Format: Paperback

List price: £99.00


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3540222170
ISBN 13: 9783540222170
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 1 June, 2004
Series: Lecture Notes in Computer Science v. 3089
Pages: 524
Description: This book constitutes the refereed proceedings of the Second International Conference on Applied Cryptography and Network Security, ACNS 2004, held in Yellow Mountain, China, in June 2004.The 36 revised full papers presented were carefully reviewed and selected from 297 submissions.
Synopsis: The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8-11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent years due to the development of the Internet, which, in turn, implies global exposure of computing resources. Many ?elds of research were covered by the program of this track, presented in this proceedings volume. We feel that the papers herein indeed re?ect the state of the art in security and cryptography research, worldwide. The program committee of the conference received a total of 297 submissions from all over the world, of which 36 submissions were selected for presentation during the academic track. In addition to this track, the conference also hosted a technical/industrial track of presentations that were carefully selected as well.All submissions were reviewed by experts in the relevant areas.
Illustrations: biography
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADVANCES IN CRYPTOLOGY - CRYPTO 2002 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
COMPUTER SECURITY -- ESORICS 2012 (PB)
CRIMEWARE (PB)
CRYPTOGRAPHIC PROTOCOLS (HB)
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
DIGITAL RIGHTS MANAGEMENT (PB)
DIGITAL SIGNATURES (HB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION AND COMMUNICATIONS SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY PRACTICE AND EXPERIENCE (PB)
INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION (PB)
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY (PB)
MOBILE AUTHENTICATION (PB)
NETWORK AND SYSTEM SECURITY (PB)
NON-REPUDIATION IN ELECTRONIC COMMERCE (HB)
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY (PB)
PHISHING AND COUNTER-MEASURES (HB)
PHISHING AND COUNTERMEASURES
PRACTICAL SIGNCRYPTION (HB)
PRACTICAL SIGNCRYPTION (PB)
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 (PB)
PROTECTING MOBILE NETWORKS AND DEVICES (HB)
PUBLIC KEY CRYPTOGRAPHY - PKC 2004 (PB)
PUBLIC KEY CRYPTOGRAPHY - PPK (PB)
SECURE MULTI-PARTY NON-REPUDIATION PROTOCOLS AND APPLICATIONS (HB)
SECURE MULTI-PARTY NON-REPUDIATION PROTOCOLS AND APPLICATIONS (PB)
SECURITY AND CRYPTOGRAPHY FOR NETWORKS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
THE DEATH OF THE INTERNET
THE DEATH OF THE INTERNET
THE DEATH OF THE INTERNET
THE DEATH OF THE INTERNET
THE DEATH OF THE INTERNET (PB)
TOWARDS TRUSTWORTHY ELECTIONS (PB)
TRUST MANAGEMENT VIII (HB)
TRUST MANAGEMENT VIII (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
UNDERSTANDING SOCIAL ENGINEERING BASED S (PB)
UNDERSTANDING SOCIAL ENGINEERING BASED SCAMS (HB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket