pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INFORMATION SECURITY AND CRYPTOLOGY
4TH INTERNATIONAL CONFERENCE, INSCRYPT 2008, BEIJING, CHINA DECEMBER 2008, REVISED SELECTED PAPERS
By: Moti Yung (Editor), Peng Liu (Editor), Dongdai Lin (Editor)
Format: Paperback

List price: £81.00


We believe that this item is permanently unavailable, and so we cannot source it.

ISBN 10: 3642014399
ISBN 13: 9783642014390
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 6 April, 2009
Series: Lecture Notes in Computer Science No. 5487
Pages: 452
Description: Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. This title presents 28 revised full papers together with 3 invited talks that were reviewed and selected from 183 submissions.
Synopsis: This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
Illustrations: biography
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADAPTIVE INTRUSION TOLERANT DATABASE SYSTEMS
ADVANCES IN CRYPTOLOGY - CRYPTO 2002 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
BAYESIAN OPTIMIZATION
COMPUTATIONAL ADVERTISING
COMPUTATIONAL ADVERTISING (HB)
COMPUTER SECURITY -- ESORICS 2012 (PB)
CRYPTOLOGY AND NETWORK SECURITY (PB)
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
CYBER SITUATIONAL AWARENESS (HB)
CYBER SITUATIONAL AWARENESS (PB)
DATA AND APPLICATIONS SECURITY (PB)
DIGITAL RIGHTS MANAGEMENT (PB)
DIGITAL SIGNATURES (HB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
MALE IDOLS AND BRANDING IN CHINESE LUXURY
MALE IDOLS AND BRANDING IN CHINESE LUXURY (HB)
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY (PB)
NETWORK AND SYSTEM SECURITY (PB)
OXIDATION AND NITRENE TRANSFER REACTIONS CATALYZED BY IRON-OLIGOPYRIDINE COMPLEXES
OXIDATION AND NITRENE TRANSFER REACTIONS CATALYZED BY IRON-OLIGOPYRIDINE COMPLEXES (HB)
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY (PB)
PRACTICAL SIGNCRYPTION (HB)
PRACTICAL SIGNCRYPTION (PB)
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 (PB)
PUBLIC KEY CRYPTOGRAPHY - PPK (PB)
QUANTITATIVE TRADING STRATEGIES USING PYTHON
SECURITY AND CRYPTOGRAPHY FOR NETWORKS (PB)
STUDY OF ELECTRON TRANSPORT IN SEMICONDUCTOR NANODEVICES
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
THIS IS NOT AVAILABLE 048429
THIS IS NOT AVAILABLE 063455
TRANSFORMING TURNAROUND SCHOOLS IN CHINA
TRANSFORMING TURNAROUND SCHOOLS IN CHINA (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket