Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 24,69
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 434 Illus.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,06
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2008
ISBN 10: 3540681590 ISBN 13: 9783540681595
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 79,87
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 415 pages. 9.25x6.25x1.00 inches. In Stock.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.
Taschenbuch. Zustand: Neu. Progress in Cryptology - AFRICACRYPT 2008 | First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings | Serge Vaudenay | Taschenbuch | xi | Englisch | 2008 | Springer | EAN 9783540681595 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 432 | Sprache: Englisch | Produktart: Bücher | This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.