Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers 1st ed. 2017 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 544 pages, height x width: 235x155 mm, weight: 8365 g, 78 Illustrations, black and white; XIII, 544 p. 78 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10143
  • Izdošanas datums: 03-Mar-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319547046
  • ISBN-13: 9783319547046
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 544 pages, height x width: 235x155 mm, weight: 8365 g, 78 Illustrations, black and white; XIII, 544 p. 78 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10143
  • Izdošanas datums: 03-Mar-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319547046
  • ISBN-13: 9783319547046
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016.

The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography;  commitment and protocol; elliptic curves; security and implementation.

Symmetric ciphers.- Public-key cryptosystems.- Signature and
authentication.- Homomorphic encryption.-Leakage-resilient.- Post-quantum
cryptography.-  Commitment and protocol.- Elliptic curves.- Security and
implementation.