108,96 €
128,19 €
Information Security and Cryptology
Information Security and Cryptology
108,96 €
128,19 €
  • Išsiųsime per 10–14 d.d.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis;…
108.96 2025-07-06 23:59:00
  • Leidėjas:
  • ISBN-10: 3030429202
  • ISBN-13: 9783030429201
  • Formatas: 15.6 x 23.4 x 3 cm, minkšti viršeliai
  • Kalba: Anglų
  • Extra -15 % nuolaida šiai knygai su kodu: ENG15

Information Security and Cryptology + nemokamas atvežimas! | knygos.lt

Atsiliepimai

Aprašymas

This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.

The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.

EXTRA 15 % nuolaida

108,96 €
128,19 €
Išsiųsime per 10–14 d.d.

Kupono kodas: ENG15

Akcija baigiasi už 3d.16:36:51

Nuolaidos kodas galioja perkant nuo 10 €. Nuolaidos nesumuojamos.

Prisijunkite ir už šią prekę
gausite 1,28 Knygų Eurų!?
Įsigykite dovanų kuponą
Daugiau

This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.

The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.

Atsiliepimai

  • Atsiliepimų nėra
0 pirkėjai įvertino šią prekę.
5
0%
4
0%
3
0%
2
0%
1
0%
[{"option":"58","probability":13,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e599c86b351751013788.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"57","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e5981e89e41751013761.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"56","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e59691dc2d1751013737.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"55","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e590bade881751013643.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"54","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58f20a7761751013618.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"53","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58d20c1ee1751013586.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"52","probability":14.5,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58b358b2e1751013555.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"51","probability":0.5,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e57cded6da1751013325.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}}]