Atjaunināt sīkdatņu piekrišanu

Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 1922, 2020, Proceedings, Part II 1st ed. 2020 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 478 pages, height x width: 235x155 mm, weight: 759 g, 53 Illustrations, color; 307 Illustrations, black and white; XIX, 478 p. 360 illus., 53 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12147
  • Izdošanas datums: 29-Aug-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030578771
  • ISBN-13: 9783030578770
  • Mīkstie vāki
  • Cena: 82,61 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 97,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 478 pages, height x width: 235x155 mm, weight: 759 g, 53 Illustrations, color; 307 Illustrations, black and white; XIX, 478 p. 360 illus., 53 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12147
  • Izdošanas datums: 29-Aug-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030578771
  • ISBN-13: 9783030578770

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. 
The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.