Austrian Post 5.99 DPD courier 6.49 GLS courier 4.49

Advances in Information and Computer Security

Language EnglishEnglish
Book Paperback
Book Advances in Information and Computer Security Tetsu Iwata
Libristo code: 01659199
Publishers Springer, Berlin, October 2011
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC... Full description
? points 204 b
86.16 včetně DPH
Low in stock at our supplier Shipping in 13-16 days
Austria Delivery to Austria

30-day return policy


You might also be interested in


Analysis of Genetic Association Studies Gang Zheng / Paperback
common.buy 122.23
Legislative Rechtserzeugung Babak Fahimi Shemrani / Paperback
common.buy 19.21
Frauenfussball und die weibliche Sozialisation Inga Schiebener / Paperback
common.buy 45.98
Intermezzo Carl Marquard Sauer / Paperback
common.buy 40.14
Der Einzelgänger, Textausgabe mit Materialien Klaus-Peter Wolf / Paperback
common.buy 10.17

This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption.This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption.

Give this book today
It's easy
1 Add to cart and choose Deliver as present at the checkout 2 We'll send you a voucher 3 The book will arrive at the recipient's address

Login

Log in to your account. Don't have a Libristo account? Create one now!

 
mandatory
mandatory

Don’t have an account? Discover the benefits of having a Libristo account!

With a Libristo account, you'll have everything under control.

Create a Libristo account