9783319167442-3319167448-Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science, 8957)

Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science, 8957)

ISBN-13: 9783319167442
ISBN-10: 3319167448
Edition: 2015
Author: Jianying Zhou, Moti Yung, Dongdai Lin
Publication date: 2015
Publisher: Springer
Format: Paperback 560 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783319167442
ISBN-10: 3319167448
Edition: 2015
Author: Jianying Zhou, Moti Yung, Dongdai Lin
Publication date: 2015
Publisher: Springer
Format: Paperback 560 pages

Summary

Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science, 8957) (ISBN-13: 9783319167442 and ISBN-10: 3319167448), written by authors Jianying Zhou, Moti Yung, Dongdai Lin, was published by Springer in 2015. With an overall rating of 4.4 stars, it's a notable title among other books. You can easily purchase or rent Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science, 8957) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book