Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Lecture Notes in Computer Science, 4856)
ISBN-13:
9783540769682
ISBN-10:
3540769684
Edition:
2007
Author:
Chaoping Xing, Huaxiong Wang, Tatsuaki Okamoto, San Ling, Feng Bao
Publication date:
2007
Publisher:
Springer
Format:
Paperback
298 pages
FREE US shipping
Book details
ISBN-13:
9783540769682
ISBN-10:
3540769684
Edition:
2007
Author:
Chaoping Xing, Huaxiong Wang, Tatsuaki Okamoto, San Ling, Feng Bao
Publication date:
2007
Publisher:
Springer
Format:
Paperback
298 pages
Summary
Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Lecture Notes in Computer Science, 4856) (ISBN-13: 9783540769682 and ISBN-10: 3540769684), written by authors
Chaoping Xing, Huaxiong Wang, Tatsuaki Okamoto, San Ling, Feng Bao, was published by Springer in 2007.
With an overall rating of 4.5 stars, it's a notable title among other
Information Management
(Processes & Infrastructure, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Algorithms, Programming, Encryption, Cryptography, History & Culture, Management & Leadership) books. You can easily purchase or rent Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Lecture Notes in Computer Science, 4856) (Paperback) from BooksRun,
along with many other new and used
Information Management
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.25.
Description
This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}