Auto boutiques-francophones Simple and secure cloud storage giftguide Kitchen Kindle Music Deals Store SGG Tools
CDN$ 184.52
Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Ships from and sold by Gift-wrap available.
Applied Cryptography and ... has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings Paperback – Jun 30 2009

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 184.52
CDN$ 127.33 CDN$ 127.41 Books Gift Guide

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Paperback: 535 pages
  • Publisher: Springer; 2009 edition (June 30 2009)
  • Language: English
  • ISBN-10: 3642019560
  • ISBN-13: 978-3642019562
  • Product Dimensions: 15.5 x 3.2 x 23.5 cm
  • Shipping Weight: 880 g
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Back Cover

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.

The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.

Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star