Skip to content

Public Key Cryptography - Pkc 2009: 12th International Conference on Practice
Stock Photo: Cover May Be Different

Public Key Cryptography - Pkc 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, USA, March 18-20, 2009 Proceedings Paperback - 2009 - 2009th Edition

by Jarecki, Stanislaw (Editor)/ Tsudik, Gene (Editor)

  • New
  • Paperback

Description

Springer-Verlag New York Inc, 2009. Paperback. New. 1st edition. 521 pages. 9.25x6.25x1.25 inches.
New
NZ$131.14
NZ$21.16 Shipping to USA
Standard delivery: 14 to 21 days
More Shipping Options
Ships from Revaluation Books (Devon, United Kingdom)

Details

About Revaluation Books Devon, United Kingdom

Biblio member since 2020
Seller rating: This seller has earned a 4 of 5 Stars rating from Biblio customers.

General bookseller of both fiction and non-fiction.

Terms of Sale: 30 day return guarantee, with full refund including original shipping costs for up to 30 days after delivery if an item arrives misdescribed or damaged.

Browse books from Revaluation Books

From the publisher

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.

From the rear cover

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.

The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials.