9783642312830-3642312837-Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Lecture Notes in Computer Science, 7341)

Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Lecture Notes in Computer Science, 7341)

ISBN-13: 9783642312830
ISBN-10: 3642312837
Edition: 2012
Author: Jianying Zhou, Pierangela Samarati, Feng Bao
Publication date: 2012
Publisher: Springer
Format: Paperback 594 pages
FREE US shipping

Book details

ISBN-13: 9783642312830
ISBN-10: 3642312837
Edition: 2012
Author: Jianying Zhou, Pierangela Samarati, Feng Bao
Publication date: 2012
Publisher: Springer
Format: Paperback 594 pages

Summary

Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Lecture Notes in Computer Science, 7341) (ISBN-13: 9783642312830 and ISBN-10: 3642312837), written by authors Jianying Zhou, Pierangela Samarati, Feng Bao, was published by Springer in 2012. With an overall rating of 4.0 stars, it's a notable title among other books. You can easily purchase or rent Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Lecture Notes in Computer Science, 7341) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book