SFr. 124.00
€ 133.92
BTC 0.0023
LTC 1.859
ETH 0.0471


bestellen

Artikel-Nr. 18574921


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:


Herausgeber: 
  • Tal Malkin
  • Vladimir Kolesnikov
  • Allison Lewko
  • Michalis Polychronakis
  • Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 3 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   Auf Bestellung (Lieferzeit unbekannt)
    Veröffentlichung:  Februar 2016  
    Genre:  EDV / Informatik 
     
    C / Coding theory & cryptology / Computer Communication Networks / Computer communication systems / computer science / Computer security / Computers / Computers and civilization / Computers and Society / Cryptology / Data and Information Security / Data encryption / Data encryption (Computer science) / Ethical & social aspects of IT / information architecture / IT Operations / Maintenance & repairs / Management information systems / Management of Computing and Information Systems / Mathematical theory of computation / Network hardware / Network Security / Systems and Data Security / Theory of Computation
    ISBN:  9783319281650 
    EAN-Code: 
    9783319281650 
    Verlag:  Springer Nature EN 
    Einband:  Kartoniert  
    Sprache:  English  
    Serie:  #9092 - Lecture Notes in Computer Science
    Security and Cryptology  
    Dimensionen:  H 235 mm / B 155 mm / D  
    Gewicht:  10643 gr 
    Seiten:  698 
    Illustration:  XVIII, 698 p. 152 illus. in color., farbige Illustrationen 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
      
     Empfehlungen... 
     Applied Cryptography and Network Security: 22nd In - (Buch)
     Applied Cryptography and Network Security: 4th Int - (Buch)
     Applied Cryptography and Network Security: 17th In - (Buch)
     Applied Cryptography and Network Security: 10th In - (Buch)
     Applied Cryptography and Network Security: 14th In - (Buch)
     Applied Cryptography and Network Security: 15th In - (Buch)
     Applied Cryptography and Network Security: Third I - (Buch)
     Applied Cryptography and Network Security: 11th In - (Buch)
     Applied Cryptography and Network Security: 16th In - (Buch)
     Applied Cryptography and Network Security: 21st In - (Buch)
     Weitersuchen in   DVD/FILME   CDS   GAMES   BÜCHERN   



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024
    Jetzt auch mit BitCoin bestellen!