Close
Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Search
Advances in Cryptology - ASIACRYPT'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings

Advances in Cryptology - ASIACRYPT'98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings (Paperback)

£72.00
Usually despatched within 2 weeks.
Order now for Free delivery in the UK.
More on delivery...

Synopsis

ASIACRYPT'98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT'98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors' affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers.

Computing & ITComputer scienceMathematical theory of computationComputing & ITComputer securityPrivacy & data protection Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Publication Date: 25/09/1998 ISBN-13: 9783540651093  Details: Type: Paperback Format: Books
Availability: Usually despatched within 2 weeks. Login for Quick Checkout Add to Basket

More books by Kazuo Ohta

More books by Dingyi Pei

Leave Review

Delivery

Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Standard Delivery FREE FREE 3-5 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Online Danger: How to Protect ...
(Paperback)
Eric Cole
 
 
£13.95
 

Currently out of stock

Romance Scam Survivor: The Whole...
(Paperback)
Jan Marshall
 
 
£14.99
 

Currently out of stock

SSH Mastery: Openssh, Putty, Tunnels,...
(Paperback)
Michael W Lucas
 
 
£18.99
 

Currently out of stock

Data Protection and Privacy: The Age...
(Hardback)
Ronald Leenes; Rosamunde van Brakel;...
 
 
£50.00
 
Latest Blog
Folklore of the Yorkshire Moors
10/02/2018

Read an Extract from Wendy Mitchell's Somebody I Used to Know
05/02/2018

Read an extract from Wendy Mitchell's Somebody I Used to Know, her memoir about living with dementia.

Where are you really from? An extract from Brit(ish): On Race, Identity and Belonging by Afua Hirsch
02/02/2018

Read an extract from Afua Hirsch's book Brit(ish): On Race, Identity and Belonging

View all Blog Entries
Twitter
Show/Hide Tweets
© W&G Foyle Ltd