0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings (Paperback, Edition.) Loot Price: R1,516
Discovery Miles 15 160
Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa,...

Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings (Paperback, Edition.)

Daniel J. Bernstein, Tanja Lange

Series: Lecture Notes in Computer Science, 6055

 (sign in to rate)
Loot Price R1,516 Discovery Miles 15 160 | Repayment Terms: R142 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting paperswererequiredto registertitles andabstractsby the ?rstdeadline, January 5. A total of 121 submissions had been received by this deadline, - though some were withdrawn before review. Authors were allowed to continue working on their papers until the second deadline, January 10. Submissions were evaluated in three phases over a period of nearly two months. The selection phase started on January 5: Program Committee m- bers began evaluating abstracts and volunteering to handle various papers. We assigned a team of people to each paper. The review phase started on January 11: Program Committee members were given access to the full papers and - gan in-depth reviews of 82 submissions. Most of the reviews were completed by February7, thebeginningofthediscussionphase.ProgramCommitteemembers were given access to other reviews and built consensus in their evaluations of the submissions. In the end the discussions included 285 full reports and 203 - ditional comments. The submissions, reviews, and subsequent discussions were handled smoothly by iChair

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Lecture Notes in Computer Science, 6055
Release date: April 2010
First published: 2010
Editors: Daniel J. Bernstein • Tanja Lange
Dimensions: 231 x 155 x 23mm (L x W x T)
Format: Paperback
Pages: 437
Edition: Edition.
ISBN-13: 978-3-642-12677-2
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 3-642-12677-4
Barcode: 9783642126772

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners