×







We sell 100% Genuine & New Books only!

Research In Cryptology : Second Western European Workshop Weworc 2007 Bochum Germany July 4-6 2007 Revised Selected Papers at Meripustak

Research In Cryptology : Second Western European Workshop Weworc 2007 Bochum Germany July 4-6 2007 Revised Selected Papers by Edited by Stefan Lucks Edited by Ahmad-Reza Sadeghi Edited by Christopher Wolf, Springer-Verlag Berlin and Heidelberg GmbH & Co. KG


  • Price: ₹ 6600.00/- [ 12.00% off ]

    Seller Price: ₹ 5808.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Edited by Stefan Lucks Edited by Ahmad-Reza Sadeghi Edited by Christopher Wolf
    PublisherSpringer-Verlag Berlin and Heidelberg GmbH & Co. KG
    EditionEdition Statement 2008 ed.
    ISBN9783540883524
    Pages153
    BindingPaperback
    LanguageEnglish
    Publish YearNovember 2008

    Description

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Research In Cryptology : Second Western European Workshop Weworc 2007 Bochum Germany July 4-6 2007 Revised Selected Papers by Edited by Stefan Lucks Edited by Ahmad-Reza Sadeghi Edited by Christopher Wolf

    This book constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology WEWoRC 2007 held in Bochum Germany in July 2007 The 12 revised full papers were carefully reviewed and selected from a total of 36 submissions. The papers cover topics such as foundations of cryptology secret-key cryptosystems and hash functions public-key cryptosystems cryptographic protocols implementation of cryptosystems and their integration into secure systems secure operating systems and trusted computing applications such as watermarking and code obfuscation.show more



    Book Successfully Added To Your Cart