Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science)



Год выпуска: 2008
Издательство:
Страниц: 534
ISBN: 3540794980
Описание
This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007. The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.


Похожие книги

  1. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  2. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  3. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  4. Ad Hoc Networks: Third International ICST Conference, ADHOCNETS 2011, Paris, France, September 21-23, 2011, Revised Selected Papers (Lecture Notes of ... and Telecommunications Engineering). – М.: , 2012. – 247 с.
  5. The Future Internet: Future Internet Assembly 2012: From Promises to Reality (Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI). – М.: , 2012. – 263 с.
  6. Fc '9, Matthew Franklin. Financial Cryptography: Third International Conference, Fc'99, Anguilla, British West Indies, Febr Uary 22-25, 1999 Proceedings (Lecture Notes in Computer Science, 1648). – М.: , 0. – 0 с.
  7. Information, and Internet Polic Research Conference on Communication, Steven S. Wildman. Rethinking Rights and Regulations : Institutional Responses to New Communications Technologies (Telecommunications Policy Research Conference). – М.: , 0. – 0 с.
  8. Science and Modern Agricult International Conference on Biotechnology, Robert E. Evenson, David Zilberman, Vittorio Santaniello, V. Santaniello. Market Development for Genetically Modified Foods. – М.: , 0. – 0 с.
  9. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  10. Financial Cryptography : 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers (Lecture Notes in Computer Science). – М.: , 2004. – 0 с.
  11. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  12. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  13. Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 205 с.
  14. Web Information Systems and Technologies: Third International Conference, WEBIST 2007, Barcelona, Spain, March 3-6, 2007, Revised Selected Papers (Lecture Notes in Business Information Processing). – М.: , 2008. – 347 с.
  15. Algorithmic Aspects in Information and Management: 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008, Proceedings (Lecture Notes in Computer Science). – М.: , 2008. – 350 с.
  16. Computational Science and Its Applications - ICCSA 2008: International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II (Lecture Notes in Computer Science). – М.: , 2008. – 1280 с.
  17. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.

Образцы работ

Тема и предметТип и объем работы
Взаимосвязь темпов роста населения и экономического развития как одна из глобальных проблем человечества. Демографическая политика.
Мировая экономика
Курсовая работа
32 стр.
Региональные особенности демографической ситуации в мире
Управление персоналом
Курсовая работа
32 стр.
Межстрановой анализ рождаемости и благосостояния населения (на примере Африки)
Экономическая география
Реферат
8 стр.
Демографическая проблема африканского континента
Естественные науки
Курсовая работа
24 стр.



Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наташа, 28.05
Спасибо большое вам я защитила диплом на 5, а Сидоров на 4 УРАААААААААААААААААА