Condition: As New. Unread book in perfect condition.
Paperback. Condition: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
Condition: New.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 49.62
Quantity: Over 20 available
Add to basketCondition: New. In.
PF. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Paperback. Condition: Brand New. 2013 edition. 512 pages. 9.00x6.25x1.25 inches. In Stock.
Paperback. Condition: Brand New. revised edition. 390 pages. 9.00x6.00x0.75 inches. In Stock.
Language: English
Published by Springer Berlin Heidelberg, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: moluna, Greven, Germany
Condition: New.
Language: English
Published by Springer Berlin Heidelberg, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22 24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ve special talks. Moti Yung gave a tutorial talk, entitled Malware Meets Cryptography. Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled On the Evolution of Adversary Models in Security Protocols and Public- Key Encryption with Keyword Search, respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation and A New Booming Era of DRM: Applications and Extending Business, respectively.
Language: English
Published by Springer Berlin Heidelberg, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.
Taschenbuch. Condition: Neu. Information Security and Cryptology -- ICISC 2012 | 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers | Taekyoung Kwon (u. a.) | Taschenbuch | xiv | Englisch | 2013 | Springer | EAN 9783642376818 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Questo è un articolo print on demand.
Language: English
Published by Springer Berlin Heidelberg, Springer Berlin Heidelberg Feb 2006, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22 24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ve special talks. Moti Yung gave a tutorial talk, entitled Malware Meets Cryptography. Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled On the Evolution of Adversary Models in Security Protocols and Public- Key Encryption with Keyword Search, respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation and A New Booming Era of DRM: Applications and Extending Business, respectively. 392 pp. Englisch.
Language: English
Published by Springer Berlin Heidelberg Apr 2013, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement. 528 pp. Englisch.
Language: English
Published by Springer Berlin Heidelberg, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. State-of-the-art research Fast-track conference proceedings Unique visibilityThis book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICIS.
Language: English
Published by Springer Berlin Heidelberg, Springer Berlin Heidelberg Apr 2013, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -InhaltsangabeAttack and defense.- Software and Web security.- Cryptanalysis.- Cryptographic protocol.- Identity-based encryption.- Efficient implementation.- Cloud computing security.- Side channel analysis.- Digital signature.- Privacy enhancement.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 528 pp. Englisch.
Language: English
Published by Springer Berlin Heidelberg, Springer Berlin Heidelberg Feb 2006, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -¿A New Booming Era of DRM: Applications and Extending Business,¿ respectively.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 392 pp. Englisch.