9783642104329-3642104320-Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings (Lecture Notes in Computer Science, 5888)

Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings (Lecture Notes in Computer Science, 5888)

ISBN-13: 9783642104329
ISBN-10: 3642104320
Edition: 2009
Author: Juan A. Garay, Akira Otsuka
Publication date: 2009
Publisher: Springer
Format: Paperback 552 pages
FREE US shipping
Buy

From $29.70

Book details

ISBN-13: 9783642104329
ISBN-10: 3642104320
Edition: 2009
Author: Juan A. Garay, Akira Otsuka
Publication date: 2009
Publisher: Springer
Format: Paperback 552 pages

Summary

Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings (Lecture Notes in Computer Science, 5888) (ISBN-13: 9783642104329 and ISBN-10: 3642104320), written by authors Juan A. Garay, Akira Otsuka, was published by Springer in 2009. With an overall rating of 4.5 stars, it's a notable title among other Information Theory (Computer Science, Data Processing, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Encryption, Cryptography) books. You can easily purchase or rent Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings (Lecture Notes in Computer Science, 5888) (Paperback) from BooksRun, along with many other new and used Information Theory books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book