kefei chen

Grid   List

  1. Ebook
    Sofort lieferbar
    'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the tru...
    171,19 €
    Alle Preise inkl. MwSt
  2. Ebook
    Sofort lieferbar
    This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers an...
    53,49 €
    Alle Preise inkl. MwSt
  3. Ebook
    Sofort lieferbar
    This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008.
    53,49 €
    Alle Preise inkl. MwSt
  4. Ebook
    Sofort lieferbar
    This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revise...
    53,49 €
    Alle Preise inkl. MwSt
  5. Ebook
    Sofort lieferbar
    This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The...
    53,49 €
    Alle Preise inkl. MwSt
  6. Ebook
    Sofort lieferbar
    This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in Nove...
    53,49 €
    Alle Preise inkl. MwSt
  7. Ebook
    Sofort lieferbar
    Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptograph...
    96,29 €
    Alle Preise inkl. MwSt
  8. Taschenbuch
    Bezug 11-15
    Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptogr...
    103,66 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  9. Buch
    Bezug 16-20
    Cryptography in Chinese consists of two characters meaning 'secret coded'. Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptogr...
    106,12 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  10. Buch
    Print on Demand
    'Cryptographic Protocol: Security Analysis Based on Trusted Freshness' mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the tru...
    181,89 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  1. 1
<%--for search--%>