Series: Lecture Notes in Computer Science (Book 1355)
Paperback: 345 pages
Publisher: Springer; 1997 edition (October 10, 2008)
Language: English
ISBN-10: 3540639276
ISBN-13: 978-3540639275
Product Dimensions: 6.1 x 0.8 x 9.2 inches
Shipping Weight: 1 pounds (View shipping rates and policies)
Average Customer Review: Be the first to review this item
Best Sellers Rank: #2,221,460 in Books (See Top 100 in Books) #372 in Books > Computers & Technology > Security & Encryption > Encryption #394 in Books > Computers & Technology > Security & Encryption > Cryptography #447 in Books > Computers & Technology > Hardware & DIY > Internet & Networking
Cryptography and Coding: 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings (Lecture Notes in Computer Science) Computer Analysis of Images and Patterns: 7th International Conference, CAIP '97, Kiel, Germany, September 10-12, 1997. Proceedings. (Lecture Notes in Computer Science) Computer Analysis of Images and Patterns: 8th International Conference, CAIP'99 Ljubljana, Slovenia, September 1-3, 1999 Proceedings (Lecture Notes in Computer Science) Advances in Artificial Intelligence: Theories, Models, and Applications: 6th Hellenic Conference on AI, SETN 2010, Athens, Greece, May 4-7, 2010. Proceedings (Lecture Notes in Computer Science) Hardware and Software: Verification and Testing: 11th International Haifa Verification Conference, HVC 2015, Haifa, Israel, November 17-19, 2015, Proceedings (Lecture Notes in Computer Science) The Semantic Web - ISWC 2008: 7th International Semantic Web Conference, ISWC 2008, Karlsruhe, Germany, October 26-30, 2008, Proceedings (Lecture Notes in Computer Science) Electronic Government: First International Conference, EGOV 2002, Aix-en-Provence, France, September 2-5, 2002. Proceedings (Lecture Notes in Computer Science) Computer Processing of Oriental Languages. Beyond the Orient: The Research Challenges Ahead: 21st International Conference, ICCPOL 2006, Singapore, ... (Lecture Notes in Computer Science) Information Processing in Medical Imaging: Proceedings of the 8th conference, Brussels, 29 August - 2 September 1983 (Proceedings of the Eighth Conference, Brussels, 29 August-2) Randomization Methods in Algorithm Design: Dimacs Workshop, December 12-14, 1997 (Dimacs Series in Discrete Mathematics and Theoretical Computer Science) Magnetism and Synchrotron Radiation: Towards the Fourth Generation Light Sources: Proceedings of the 6th International School "Synchrotron Radiation ... 2012 (Springer Proceedings in Physics) The Use of Projective Geometry in Computer Graphics (Lecture Notes in Computer Science) Biomagnetism: Clinical Aspects : Proceedings of the 8th International Conference on Biomagnetism, Munster, 19-24 August, 1991 (International Congress Series) Ada 2012 Reference Manual. Language and Standard Libraries: International Standard ISO/IEC 8652/2012 (E) (Lecture Notes in Computer Science) Applied Cryptography: Protocols, Algorithms, and Source Code in C [ APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C BY Schneier, Bruce ( Author ) Nov-01-1995 Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series) Face Image Analysis by Unsupervised Learning (The Kluwer International Series in Engineering and Computer Science, Volume 612) (The Springer International Series in Engineering and Computer Science) Ford Pick-ups 1997 thru 2003 & Expedition 1997 thru 2014: Full-size, F-150 & F-250, Gasoline Engines - Includes Lincoln Navigator and F-150 Heritage (Haynes Repair Manual) Distributed Platforms: Proceedings of the IFIP/IEEE International Conference on Distributed Platforms: Client/Server and Beyond: DCE, CORBA, ODP and ... in Information and Communication Technology)