Home
Cryptography and Information Security the Balkans: First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, Revised Selected Papers
Barnes and Noble
Loading Inventory...
Cryptography and Information Security the Balkans: First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, Revised Selected Papers in Franklin, TN
Current price: $54.99

Barnes and Noble
Cryptography and Information Security the Balkans: First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, Revised Selected Papers in Franklin, TN
Current price: $54.99
Loading Inventory...
Size: Paperback
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014.
The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic prools and public key cryptography. The book also contains one invited talk in full paper length.
The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic prools and public key cryptography. The book also contains one invited talk in full paper length.
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014.
The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic prools and public key cryptography. The book also contains one invited talk in full paper length.
The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic prools and public key cryptography. The book also contains one invited talk in full paper length.

















