Christina Pöpper - Böcker
Visar alla böcker från författaren Christina Pöpper. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Del 14583 - Lecture Notes in Computer Science
Applied Cryptography and Network Security
22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
Häftad, Engelska, 2024
882 kr
Skickas inom 7-10 vardagar
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. They have been organized in topical sections as follows: Part I: Cryptographic protocols;
Del 14584 - Lecture Notes in Computer Science
Applied Cryptography and Network Security
22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II
Häftad, Engelska, 2024
882 kr
Skickas inom 10-15 vardagar
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. They have been organized in topical sections as follows: Part I: Cryptographic protocols;
Del 14585 - Lecture Notes in Computer Science
Applied Cryptography and Network Security
22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III
Häftad, Engelska, 2024
1 429 kr
Skickas inom 7-10 vardagar
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.