0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings (Paperback, 2005 ed.) Loot Price: R3,064
Discovery Miles 30 640
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005,...

Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings (Paperback, 2005 ed.)

Joe Kilian

Series: Security and Cryptology, 3378

 (sign in to rate)
Loot Price R3,064 Discovery Miles 30 640 | Repayment Terms: R287 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

TCC 2005, the 2nd Annual Theory of Cryptography Conference, was held in Cambridge, Massachusetts, onFebruary10-12,2005.Theconferencereceived84 submissions, ofwhichtheprogramcommitteeselected32forpresentation.These proceedings contain the revised versions of the submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also included a panel discussion on the future of theoretical cryptography and its relationship to the real world (whatever that is). It also included the traditional "rump session," featuring short, informal talks on late-breaking research news. Much as hatters of old faced mercury-induced neurological damage as an occupational hazard, computer scientists will on rare occasion be a?icted with egocentrism, probably due to prolonged CRT exposure. Thus, you must view withpityandnotcontemptmyunalloyedelationathavingmynameonthefront cover of this LNCS volume, and my deep-seated conviction that I fully deserve the fame and riches that will surely come of it. However, having in recent years switched over to an LCD monitor, I would like to acknowledge some of the many who contributed to this conference. First thanks are due to the many researchers from all over the world who submitted their work to this conference. Lacking shrimp and chocolate-covered strawberries, TCC has to work hard to be a good conference. As a community, I think we have.

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Security and Cryptology, 3378
Release date: 2005
First published: 2005
Editors: Joe Kilian
Dimensions: 235 x 155 x 32mm (L x W x T)
Format: Paperback
Pages: 628
Edition: 2005 ed.
ISBN-13: 978-3-540-24573-5
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 3-540-24573-1
Barcode: 9783540245735

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners