Chen-Mou Cheng - Böcker
Visar alla böcker från författaren Chen-Mou Cheng. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Del 13504 - Lecture Notes in Computer Science
Advances in Information and Computer Security
17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings
Häftad, Engelska, 2022
769 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSEC 2022, which took place as a hybrid event in Tokyo, Japan, in August/September 2022. They were organized in topical sections as follows: mathematical cryptography;
Public-Key Cryptography – PKC 2016
19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Häftad, Engelska, 2016
551 kr
Skickas inom 10-15 vardagar
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.
Public-Key Cryptography – PKC 2016
19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II
Häftad, Engelska, 2016
551 kr
Skickas inom 10-15 vardagar
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.