Muutke küpsiste eelistusi

Public-Key Cryptography PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II 2019 ed. [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 680 pages, kõrgus x laius: 235x155 mm, kaal: 1056 g, 29 Illustrations, color; 1229 Illustrations, black and white; XVIII, 680 p. 1258 illus., 29 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 11443
  • Ilmumisaeg: 06-Apr-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030172589
  • ISBN-13: 9783030172589
  • Pehme köide
  • Hind: 85,76 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 100,89 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 680 pages, kõrgus x laius: 235x155 mm, kaal: 1056 g, 29 Illustrations, color; 1229 Illustrations, black and white; XVIII, 680 p. 1258 illus., 29 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 11443
  • Ilmumisaeg: 06-Apr-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030172589
  • ISBN-13: 9783030172589
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.





The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Cryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.