Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 912, 2022, Proceedings - Lecture Notes in Computer Science 13783
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 912, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 912, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"4493","item_name":"This Is How They Tell Me the World Ends: A True Story","item_brand":"Nicole Perlroth","item_category":"Computing & Internet","list":"Product Page","price":"1.95","variant":"","quantity":1},{"item_id":"9082","item_name":"Handbook of Applied Cryptography - Discrete Mathematics and Its Applications","item_brand":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone","item_category":"Computing & Internet","list":"Product Page","price":"88.39","variant":"","quantity":1},{"item_id":"9133","item_name":"Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks","item_brand":"Geoff White","item_category":"Computing & Internet","list":"Product Page","price":"5.28","variant":"","quantity":1},{"item_id":"9809","item_name":"Cryptography For Dummies","item_brand":"Chey Cobb","item_category":"Computing & Internet","list":"Product Page","price":"7.06","variant":"","quantity":1},{"item_id":"9973","item_name":"Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto","item_brand":"Roger A. Grimes","item_category":"Computing & Internet","list":"Product Page","price":"13.96","variant":"","quantity":1},{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1},{"item_id":"10959","item_name":"Cryptography InfoSec Pro Guide","item_brand":"Sean-Philip Oriyano","item_category":"Computing & Internet","list":"Product Page","price":"9.29","variant":"","quantity":1},{"item_id":"11289","item_name":"Fundamentals of Smart Contract Security - Computer Engineering Foundations, Currents, and Trajectories Collection","item_brand":"Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, Olga V. Mack","item_category":"Computing & Internet","list":"Product Page","price":"23.90","variant":"","quantity":1}]