This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.
"synopsis" may belong to another edition of this title.
Shipping:
£ 3.37
Within U.S.A.
Seller: Zubal-Books, Since 1961, Cleveland, OH, U.S.A.
Condition: USED_GOOD. 367 pp., Paperback, ex library, covers and edges worn, else text clean and binding tight. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country. Seller Inventory # ZB764647
Quantity: 1 available
Seller: GuthrieBooks, Spring Branch, TX, U.S.A.
Paperback. Condition: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Interior clean and unmarked. Tight binding. Seller Inventory # UTD1421216
Quantity: 1 available
Seller: Ergodebooks, Houston, TX, U.S.A.
Softcover. Condition: Good. 2007. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. Seller Inventory # SONG3540767878
Quantity: 1 available
Seller: Irish Booksellers, Portland, ME, U.S.A.
Condition: Good. SHIPS FROM USA. Used books have different signs of use and do not include supplemental materials such as CDs, Dvds, Access Codes, charts or any other extra material. All used books might have various degrees of writing, highliting and wear and tear and possibly be an ex-library with the usual stickers and stamps. Dust Jackets are not guaranteed and when still present, they will have various degrees of tear and damage. All images are Stock Photos, not of the actual item. book. Seller Inventory # 28-3540767878-G
Quantity: 1 available
Seller: booksXpress, Bayonne, NJ, U.S.A.
Soft Cover. Condition: new. Seller Inventory # 9783540767879
Quantity: 10 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783540767879
Quantity: Over 20 available
Seller: Buchpark, Trebbin, Germany
Condition: Sehr gut. Zustand: Sehr gut - Neubindung, Buchrücken leicht angestossen, A. 2007 | Seiten: 384 | Sprache: Englisch | Produktart: Bücher. Seller Inventory # 4066539/12
Quantity: 1 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: NEW. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9783540767879_lsuk
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. xiii + 367 1st Edition. Seller Inventory # 26304959
Quantity: 4 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. 384 pp. Englisch. Seller Inventory # 9783540767879
Quantity: 2 available