Atjaunināt sīkdatņu piekrišanu

Public-Key Cryptography PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I 2019 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 614 pages, height x width: 235x155 mm, weight: 955 g, 13 Illustrations, color; 913 Illustrations, black and white; XVII, 614 p. 926 illus., 13 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11442
  • Izdošanas datums: 06-Apr-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 303017252X
  • ISBN-13: 9783030172527
  • Mīkstie vāki
  • Cena: 75,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 88,79 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 614 pages, height x width: 235x155 mm, weight: 955 g, 13 Illustrations, color; 913 Illustrations, black and white; XVII, 614 p. 926 illus., 13 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11442
  • Izdošanas datums: 06-Apr-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 303017252X
  • ISBN-13: 9783030172527
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.





The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.