
Applied Cryptography and Network Security
4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings
By: Jianying Zhou (Editor), Moti Yung (Editor), Feng Bao (Editor)
Paperback | 30 May 2006
At a Glance
Paperback
$169.00
Ships in 5 to 7 business days
ISBN: 9783540347033
ISBN-10: 3540347038
Series: Lecture Notes in Computer Science
Published: 30th May 2006
Format: Paperback
Language: English
Number of Pages: 508
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: DE
Dimensions (cm): 22.86 x 15.24 x 3.18
Weight (kg): 0.7
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In
This product is categorised by
- Non-FictionReference, Information & Interdisciplinary SubjectsInterdisciplinary StudiesCommunication Studies
- Non-FictionEngineering & TechnologyElectronics & Communications EngineeringCommunications Engineering & Telecommunications
- Non-FictionReference, Information & Interdisciplinary SubjectsResearch & InformationCoding Theory & Cryptology
- Non-FictionComputing & I.T.Computer Science
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Operating Systems
- Non-FictionBusiness & ManagementBusiness Mathematics & Systems
- Non-FictionComputing & I.T.Information Technology General IssueEthical & Social Aspects of IT
- Non-FictionComputing & I.T.Computer HardwareNetwork Hardware
- Non-FictionComputing & I.T.Computer SecurityData Encryption
























