pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: CRYPTOLOGY AND NETWORK SECURITY
11TH INTERNATIONAL CONFERENCE, CANS 2012, DARMSTADT, GERMANY, DECEMBER 12-14, 2012. PROCEEDINGS
By: Josef Pieprzyk (Editor), Ahmad-Reza Sadeghi (Editor), Mark Manulis (Editor)
Format: Paperback

List price: £48.99


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3642354033
ISBN 13: 9783642354038
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 13 November, 2012
Edition: 2012 ed.
Series: Lecture Notes in Computer Science 7712
Pages: 311
Description: Constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012.
Synopsis: This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.
Illustrations: 48 Illustrations, black and white; XVI, 311 p. 48 illus.
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADVANCES IN CRYPTOLOGY - ASIACRYPT `94 (PB)
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008 (PB)
ADVANCES IN CRYPTOLOGY - AUSCRYPT '90 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
AUTOMATED SOFTWARE DIVERSITY
BUILDING SECURE DEFENSES AGAINST CODE-REUSE ATTACKS (PB)
CLOUD COMPUTING SECURITY: FOUNDATIONS AND RESEARCH DIRECTIONS
DESIGN OF HASHING ALGORITHMS (PB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
FUNDAMENTALS OF COMPUTER SECURITY (HB)
FUNDAMENTALS OF COMPUTER SECURITY (PB)
FUTURE OF TRUST IN COMPUTING (PB)
INFORMATION HIDING (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
INFORMATION SECURITY AND PRIVACY (PB)
PHYSICALLY UNCLONABLE FUNCTIONS (PUFS)
PHYSICALLY UNCLONABLE FUNCTIONS (PUFS)
PHYSICALLY UNCLONABLE FUNCTIONS (PUFS) (PB)
PROVABLE SECURITY (PB)
PUBLIC KEY CRYPTOGRAPHY (PB)
RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES (PB)
RESEARCH IN CRYPTOLOGY (PB)
THEORY AND PRACTICE OF CRYPTOGRAPHY SOLUTIONS FOR SECURE INFORMATION SYSTEMS
THEORY AND PRACTICE OF CRYPTOGRAPHY SOLUTIONS FOR SECURE INFORMATION SYSTEMS
THEORY AND PRACTICE OF CRYPTOGRAPHY SOLUTIONS FOR SECURE INFORMATION SYSTEMS (HB)
TOPICS IN CRYPTOLOGY - CT-RSA 2010 (PB)
TOWARDS HARDWARE-INTRINSIC SECURITY (HB)
TOWARDS HARDWARE-INTRINSIC SECURITY (PB)
TRUST AND TRUSTWORTHY COMPUTING (PB)
TRUSTED COMPUTING CHALLENGES AND APPLICATIONS (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket