Austrian Post 5.99 DPD courier 6.49 GLS courier 4.49

Information Security Applications

Language EnglishEnglish
Book Paperback
Book Information Security Applications Yongwha Chung
Libristo code: 01657255
Publishers Springer, Berlin, November 2010
This book constitutes the refereed proceedings of the 11th International Workshop on Information Sec... Full description
? points 163 b
69.14 včetně DPH
In stock at our supplier Shipping in 13-18 days
Austria Delivery to Austria

30-day return policy


You might also be interested in


MODRÉ HORY Kamil Zvelebil / Book
common.buy 10.27
Seat Ibiza 1993 - 2001, Cordoba 1993 - 2002 Hans-Rüdiger Etzold / Paperback
common.buy 24.07
Dutch Armies of the 80 Years' War 1568-1648 (2) Bouko De Groot / Paperback
common.buy 14.87
Earth House Hold Gary Snyder / Paperback
common.buy 15.08
Journey of the Two Unicorns Lucy Linn Fells / Paperback
common.buy 19.58
Roman Art from the Louvre Daniel Roger / Hardback
common.buy 66.89
Approximating Prudence Andrew M. Yuengert / Hardback
common.buy 134.22
gelbe Schlange Edgar Wallace / Paperback
common.buy 15.95
Last Car To Elysian Fields James Lee Burke / Paperback
common.buy 12.41
Die kleine Cocktailfee Katrin Willuhn / Hardback
common.buy 15.95
Companion to the Archaeology of the Roman Republic Jane DeRose Evans / Hardback
common.buy 216.54

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.§The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

Give this book today
It's easy
1 Add to cart and choose Deliver as present at the checkout 2 We'll send you a voucher 3 The book will arrive at the recipient's address

Login

Log in to your account. Don't have a Libristo account? Create one now!

 
mandatory
mandatory

Don’t have an account? Discover the benefits of having a Libristo account!

With a Libristo account, you'll have everything under control.

Create a Libristo account