Product Type
Condition
Binding
Collectible Attributes
Free Shipping
Seller Location
Seller Rating
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: GuthrieBooks, Spring Branch, TX, U.S.A.
Book
Paperback. Condition: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: booksXpress, Bayonne, NJ, U.S.A.
Book
Soft Cover. Condition: new.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Book
Condition: New.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Book
Condition: New.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Book Print on Demand
Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: GreatBookPricesUK, Castle Donington, DERBY, United Kingdom
Book
Condition: New.
Published by Springer Berlin Heidelberg Nov 2008, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Book Print on Demand
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers. 588 pp. Englisch.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Revaluation Books, Exeter, United Kingdom
Book
Paperback. Condition: Brand New. 1st edition. 572 pages. 9.00x6.00x1.00 inches. In Stock.
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
Book
Condition: New. Constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia. This book includes such topics as muliti-party computation, cryptographic protocols, cryptographic hash functions, and public-key cryptography. Editor(s): Pieprzyk, Josef. Series: Lecture Notes in Computer Science / Security and Cryptology. Num Pages: 586 pages, biography. BIC Classification: PBD; UKN; UMB; URY; UYZM. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 36. Weight in Grams: 890. . 2008. Paperback. . . . .
Published by Springer Berlin Heidelberg, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: AHA-BUCH GmbH, Einbeck, Germany
Book
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.
Published by Springer 2008-11, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Chiron Media, Wallingford, United Kingdom
Book
PF. Condition: New.
Published by Springer Berlin Heidelberg, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: moluna, Greven, Germany
Book Print on Demand
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented to.
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Kennys Bookstore, Olney, MD, U.S.A.
Book
Condition: New. Constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia. This book includes such topics as muliti-party computation, cryptographic protocols, cryptographic hash functions, and public-key cryptography. Editor(s): Pieprzyk, Josef. Series: Lecture Notes in Computer Science / Security and Cryptology. Num Pages: 586 pages, biography. BIC Classification: PBD; UKN; UMB; URY; UYZM. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 36. Weight in Grams: 890. . 2008. Paperback. . . . . Books ship from the US and Ireland.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: GreatBookPricesUK, Castle Donington, DERBY, United Kingdom
Book
Condition: As New. Unread book in perfect condition.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: Mispah books, Redhill, SURRE, United Kingdom
Book
Paperback. Condition: Like New. Like New. book.
Published by Springer, 2008
ISBN 10: 3540892540ISBN 13: 9783540892540
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Book
Condition: As New. Unread book in perfect condition.