Soft Cover. Zustand: Acceptable. Lecture Notes in Computer Science (LNCS) 4301. Usual ex-library features. The interior is clean and tight. Binding is good. Cover shows slight wear. 380 pages. Ex-Library.
Softcover. Zustand: Fair. Aus Bibliothek aussortiert; Leichte Abnutzungen; Farbveränderung durch Alter/Sonne. Eine umfassende Bestandsaufnahme des Theaters im heutigen China.
Anbieter: Phatpocket Limited, Waltham Abbey, HERTS, Vereinigtes Königreich
EUR 58,85
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Verlag: Selbstverlag des Mathematisches Institut der Justus-Liebig-Universität Giessen Gießen,, 1995
Anbieter: Bernhard Kiewel Rare Books, Grünberg, Deutschland
21 x 15. GF D. Gaier, T. Timmesfeld. 106 Seiten. OKart. Sehr guter Zustand. Sprache: Deutsch Gewicht in Gramm: 200.
Verlag: Selbstverlag des Mathematisches Institut der Justus-Liebig-Universität Giessen Gießen,, 1995
Anbieter: Bernhard Kiewel Rare Books, Grünberg, Deutschland
21 x 15. GF D. Gaier, T. Timmesfeld. 106 Seiten. OKart. Sehr guter Zustand. Sprache: Deutsch Gewicht in Gramm: 200.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 84,29
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 268 52:B&W 6.14 x 9.21in or 234 x 156mm (Royal 8vo) Case Laminate on White w/Gloss Lam.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2007
ISBN 10: 3540494626 ISBN 13: 9783540494621
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,22
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 381 pages. 9.25x6.00x1.00 inches. In Stock.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2008
ISBN 10: 3540887326 ISBN 13: 9783540887324
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,29
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2008 edition. 359 pages. 9.00x6.00x0.75 inches. In Stock.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2006
ISBN 10: 3540330526 ISBN 13: 9783540330523
Anbieter: moluna, Greven, Deutschland
EUR 62,47
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selec.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2006
ISBN 10: 3540494758 ISBN 13: 9783540494751
Anbieter: moluna, Greven, Deutschland
EUR 62,92
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, .
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Okt 2008, 2008
ISBN 10: 3540887326 ISBN 13: 9783540887324
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008. The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, and Applications.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 376 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Mär 2017, 2017
ISBN 10: 3319547046 ISBN 13: 9783319547046
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 560 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2008
ISBN 10: 3540887326 ISBN 13: 9783540887324
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008. The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, and Applications.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2006
ISBN 10: 3540494626 ISBN 13: 9783540494621
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.
Sprache: Englisch
Verlag: Springer International Publishing, 2017
ISBN 10: 3319547046 ISBN 13: 9783319547046
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2017
ISBN 10: 3319547046 ISBN 13: 9783319547046
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 80,62
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. revised edition. 560 pages. 9.25x6.10x1.27 inches. In Stock.
Sprache: Englisch
Verlag: Springer, Berlin, Springer, 2006
ISBN 10: 3540330526 ISBN 13: 9783540330523
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11-14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information security technologies become pervasive, issues pertaining to their deployment and operations are becoming increasingly imp- tant. ISPEC is an annual conference that brings together researchers and pr- titioners to provide a con uence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. ISPEC 2006 received 307 submissions. This is probably the highest number of paper submissions in any information security-related technical conferences. Due to this exceptionally large number of submissions and the high quality of the submitted papers, not all the papers that contained innovative ideas could be accepted. Each paper was sent to at least three Program Committee m- bers for comments. Based on the reviewers' comments and discussion by the Program Committee, of the 307 submissions, 35 were selected for inclusion in these proceedings as research track papers and another 21 papers were selected as industrial track papers and are published in the Journal of Shanghai Jiaotong University (Science).
Sprache: Englisch
Verlag: Springer, Berlin, Springer, 2006
ISBN 10: 3540494758 ISBN 13: 9783540494751
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2013
ISBN 10: 1475779623 ISBN 13: 9781475779622
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 148,12
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 261 pages. 9.25x6.10x0.61 inches. In Stock.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond 'secret coding'. China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
Sprache: Englisch
Verlag: Springer US, Springer New York, 2004
ISBN 10: 1402079869 ISBN 13: 9781402079863
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond 'secret coding'. China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students.Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2012
ISBN 10: 3642240720 ISBN 13: 9783642240720
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - 'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism's efficiency, rigorousness, and the possibility of its automation are also presented.The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2012
ISBN 10: 3642240720 ISBN 13: 9783642240720
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 269,64
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 2011 edition. 250 pages. 9.29x6.22x1.02 inches. In Stock.