EUR 8
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. 1988th Edition. Used book that is in clean, average condition without any missing pages.
Vendeur : Readme Books, Tucson, AZ, Etats-Unis
Edition originale
EUR 9,66
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Very Good. 1st Edition. Binding tight. Text block has no marks or writing. No shelf wear to boards. No dust jacket as issued. Satisfaction guaranteed. Selling quality books online for 30 years. Ships in 24 hours.
EUR 6,80
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. 1988th Edition. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
EUR 26,33
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.83.
Vendeur : HALCYON BOOKS, LONDON, Royaume-Uni
EUR 5,32
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Very Good. ALL ITEMS ARE DISPATCHED FROM THE UK WITHIN 48 HOURS ( BOOKS ORDERED OVER THE WEEKEND DISPATCHED ON MONDAY) ALL OVERSEAS ORDERS SENT BY TRACKABLE AIR MAIL. IF YOU ARE LOCATED OUTSIDE THE UK PLEASE ASK US FOR A POSTAGE QUOTE FOR MULTI VOLUME SETS BEFORE ORDERING.
Edité par Kluwer Academic Publishers, 1988
ISBN 10 : 0898382718 ISBN 13 : 9780898382716
Langue: anglais
Vendeur : Ammareal, Morangis, France
EUR 5,08
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 1988. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 1988. Ammareal gives back up to 15% of this item's net price to charity organizations.
Vendeur : Zubal-Books, Since 1961, Cleveland, OH, Etats-Unis
EUR 40,65
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. 378 pp., Hardcover, NEW!! - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 53,87
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 53,87
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Best Price, Torrance, CA, Etats-Unis
EUR 48,31
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. SUPER FAST SHIPPING.
Vendeur : Best Price, Torrance, CA, Etats-Unis
EUR 48,31
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. SUPER FAST SHIPPING.
Edité par Springer-Verlag New York Inc., New York, NY, 2013
ISBN 10 : 1475782837 ISBN 13 : 9781475782837
Langue: anglais
Vendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
EUR 56,45
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 52,96
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par Kluwer Academic Publishers, Dordrecht, 1999
ISBN 10 : 0792386752 ISBN 13 : 9780792386759
Langue: anglais
Vendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
EUR 56,86
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : new. Hardcover. The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, for example, adding a signature to an electronic document. Cryptology addresses the above issues - it is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical in nature. This work serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver must share a secret key. Second, the book presents public key cryptosystems, which make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, such as the factorization of large numbers.The remaining chapters cover a variety of topics, including zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in detail: one presents elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions) and the other introduces finite fields and their algebraic structure. The text is an updated and improved version of "An Introduction to Cryptology," originally published in 1988. Apart from a revision of the existing material, there are many new sections, and two new chapters on elliptic curves and authentication codes, respectively. In addition, the book is accompanied by a full text electronic version on CD-ROM as an interactive Mathematica manuscript. "Basic Concepts in Cryptology" should be of interest to computer scientists, mathematicians, and researchers, students, and practitioners in the area of cryptography. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 53,38
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : California Books, Miami, FL, Etats-Unis
EUR 59,73
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 61,77
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 61,99
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Universitätsbuchhandlung Herta Hold GmbH, Berlin, Allemagne
EUR 35
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panier1. Ed. XII, 684 S. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Stamped. Sprache: Englisch.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 53,89
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 58,03
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In English.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 60,02
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 56,76
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
EUR 79,04
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 512.
EUR 80,05
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 510.
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
EUR 71,64
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New. 2013. Paperback. . . . . .
EUR 91,74
Autre deviseQuantité disponible : 5 disponible(s)
Ajouter au panierEtat : Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Vendeur : Romtrade Corp., STERLING HEIGHTS, MI, Etats-Unis
EUR 91,74
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Edité par Kluwer Academic Publishers, 1999
ISBN 10 : 0792386752 ISBN 13 : 9780792386759
Langue: anglais
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
EUR 81,81
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. This title serves as an introduction to the cryptographic methods. It presents public key cryptosystems, which make it possible to protect data without a prearranged key. Series: The Springer International Series in Engineering and Computer Science. Num Pages: 492 pages, biography. BIC Classification: GPJ; URY. Category: (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 254 x 178 x 28. Weight in Grams: 1096. . 1999. 2000th Edition. Hardcover. . . . .
Edité par Kluwer Academic Publishers, 2002
ISBN 10 : 1402070799 ISBN 13 : 9781402070792
Langue: anglais
Vendeur : New Book Sale, London, Royaume-Uni
EUR 41,34
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : New. Usually Dispatched within 1-2 Business Days , Buy with confidence , excellent customer service.