pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INFORMATION SECURITY AND CRYPTOLOGY
FIRST SKLOIS CONFERENCE, CISC 2005, BEIJING, DECEMBER 15-17, 2005 : PROCEEDINGS
By: Dengguo Feng (Editor), Dongdai Lin (Editor), Moti Yung (Editor)
Format: Paperback

List price: £78.50


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3540308555
ISBN 13: 9783540308553
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 7 December, 2005
Edition: 2005 ed.
Series: Lecture Notes in Computer Science / Security and Cryptology v. 3822
Pages: 428
Description: Constitutes the proceedings of the First SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, CISC 2005. This book is organized in topical sections on identity based cryptography, security modelling, systems security, signature schemes, symmetric key mechanisms, threshold cryptography, and more.
Synopsis: The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume.In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.
Illustrations: biography
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADVANCES IN CRYPTOLOGY - CRYPTO 2002 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
BOOLEAN FUNCTIONS AND THEIR APPLICATIONS IN CRYPTOGRAPHY (HB)
COMPUTER SECURITY -- ESORICS 2012 (PB)
CRYPTOLOGY AND NETWORK SECURITY (PB)
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
CYBERSPACE SAFETY AND SECURITY (PB)
DIGITAL RIGHTS MANAGEMENT (PB)
DIGITAL SIGNATURES (HB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY (PB)
NETWORK AND SYSTEM SECURITY (PB)
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY (PB)
PRACTICAL SIGNCRYPTION (HB)
PRACTICAL SIGNCRYPTION (PB)
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 (PB)
PUBLIC KEY CRYPTOGRAPHY - PPK (PB)
SECURITY AND CRYPTOGRAPHY FOR NETWORKS (PB)
TRUSTED COMPUTING
TRUSTED COMPUTING
TRUSTED COMPUTING (HB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket