Information Security and Cryptology (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Serie
Lecture Notes in Computer Science
Antal sidor
428
Utgivningsdatum
2005-12-07
Förlag
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Dimensioner
234 x 156 x 23 mm
Vikt
613 g
ISBN
9783540308553

Information Security and Cryptology

First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

Häftad,  Engelska, 2005-12-07
556

10% rabatt på allt med kod NYSTART26

Gäller t.o.m. 25 januari. Villkor.

  • Skickas från oss inom 10-15 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Finns även som
Visa alla 1 format & utgåvor
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.
Visa hela texten

Passar bra ihop

  1. Information Security and Cryptology
  2. +
  3. Trusted Computing

De som köpt den här boken har ofta också köpt Trusted Computing av Dengguo Feng, Dengguo Feng Tsinghua University Press (inbunden).

Köp båda 2 för 2300 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna