Update cookies preferences

Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 1012, 2017, Proceedings - In Honor of Claude Carlet 1st ed. 2017 [Paperback / softback]

Edited by , Edited by , Edited by
  • Format: Paperback / softback, 384 pages, height x width: 235x155 mm, weight: 5971 g, 46 Illustrations, black and white; XII, 384 p. 46 illus., 1 Paperback / softback
  • Series: Security and Cryptology 10194
  • Pub. Date: 09-Mar-2017
  • Publisher: Springer International Publishing AG
  • ISBN-10: 331955588X
  • ISBN-13: 9783319555881
Other books in subject:
  • Paperback / softback
  • Price: 48,70 €*
  • * the price is final i.e. no additional discount will apply
  • Regular price: 57,29 €
  • Save 15%
  • This book is not in stock. Book will arrive in about 2-4 weeks. Please allow another 2 weeks for shipping outside Estonia.
  • Quantity:
  • Add to basket
  • Delivery time 4-6 weeks
  • Add to Wishlist
  • Format: Paperback / softback, 384 pages, height x width: 235x155 mm, weight: 5971 g, 46 Illustrations, black and white; XII, 384 p. 46 illus., 1 Paperback / softback
  • Series: Security and Cryptology 10194
  • Pub. Date: 09-Mar-2017
  • Publisher: Springer International Publishing AG
  • ISBN-10: 331955588X
  • ISBN-13: 9783319555881
Other books in subject:
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.