Seller: Anybook.com, Lincoln, United Kingdom
Condition: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. In good all round condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9783642389078.
Soft Cover. Condition: Good. Lecture Notes in Computer Science, 4872. Usual ex-library features. The interior is clean and tight. Binding is good. Cover shows slight wear and has library label on the front. 246 pages. Ex-Library.
XVII, 548 p. Softcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Security and Cryptology, 11261. Sprache: Englisch.
Paperback. Condition: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Text block clean and unmarked. Tight binding.
Condition: New.
Language: English
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2013
ISBN 10: 3642389074 ISBN 13: 9783642389078
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs. This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Condition: New.
Condition: New.
Language: English
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2007
ISBN 10: 3540732748 ISBN 13: 9783540732747
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We received 87 submissions. After quick-rejecting 5 papers deemed to be out of scope, the remaining 82 papers were each reviewed by at least three PC members. The two program chairs, who did not submit any works, had sole authoritytodecidewhichpaperstoacceptandreject,basedonlyonthedirective that quality had to be the primary criterion, in order to form a proceedings volume of high international relevance. The number of papers to be accepted was not set in advance: it was selected a posteriori so as to include only solid, innovative and insightful papers. The resulting acceptance rate of about 20%, very strict for a workshop, is a testimonial of how selective we chose to be in accepting only high quality papers. You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The number of papers to be accepted was not set in advance: it was selected a posteriori so as to include only solid, innovative and insightful papers. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Condition: New.
Language: English
Published by Springer Nature Switzerland AG, Cham, 2018
ISBN 10: 303002640X ISBN 13: 9783030026400
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security. This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Condition: As New. Unread book in perfect condition.
Condition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 44.30
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Condition: New. pp. 262.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Condition: New. pp. 262 Illus.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 49.30
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 49.30
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Paperback. Condition: New.
Condition: New. pp. 294.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 262.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Paperback. Condition: Brand New. 2013 edition. 292 pages. 9.25x6.10x0.66 inches. In Stock.