|Listed in category:
Have one to sell?

Lecture Notes in Computer Science Ser.: Security Protocols : Proceedings of...

US $35.00
ApproximatelyRM 150.29
or Best Offer
Condition:
Good
Good to very good condition with wear.
Shipping:
US $5.38 (approx RM 23.10) USPS Media MailTM.
Located in: Ore City, Texas, United States
Delivery:
Estimated between Thu, 22 May and Thu, 29 May to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
No returns accepted.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:255715691777
Last updated on Nov 13, 2023 14:01:06 MYTView all revisionsView all revisions

Item specifics

Condition
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See all condition definitionsopens in a new window or tab
Seller Notes
“Good to very good condition with wear.”
Subject Area
Security Protocols
Educational Level
Adult & Further Education
Level
Advanced
Country/Region of Manufacture
United States
Subject
Computer Science
Original/Facsimile
Original
ISBN
9783540640400

About this product

Product Identifiers

Publisher
Springer Berlin / Heidelberg
ISBN-10
3540640401
ISBN-13
9783540640400
eBay Product ID (ePID)
1085355

Product Key Features

Number of Pages
VIII, 220 Pages
Language
English
Publication Name
Security Protocols : Proceedings of the 5th International Workshop, Paris, France, April 7-9, 1997
Publication Year
1998
Subject
Programming / Algorithms, Communication Studies, Security / Cryptography, Networking / General, Security / General
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Author
B. Crispo
Series
Lecture Notes in Computer Science Ser.
Format
Trade Paperback

Dimensions

Item Height
0.2 in
Item Weight
25.8 Oz
Item Length
9.3 in
Item Width
6.1 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
98-002586
Dewey Edition
21
Series Volume Number
1361
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Secure books: Protecting the distribution of knowledge.- Protocols using anonymous connections: Mobile applications.- Receipt-free electronic voting schemes for large scale elections.- Flexible internet secure transactions based on collaborative domains.- How to build evidence in a public-key infrastructure for multi-domain environments.- On signature schemes with threshold verification detecting malicious verifiers.- Open key exchange: How to defeat dictionary attacks without encrypting public keys.- Protocol interactions and the chosen protocol attack.- Binding bit patterns to real world entities.- Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults.- Low cost attacks on tamper resistant devices.- Entity authentication and authenticated key transport protocols employing asymmetric techniques.- SG logic -- a formal analysis technique for authentication protocols.- How to convert any digital signature scheme into a group signature scheme.- Threshold key-recovery systems for RSA.- A weakness of the Menezes-Vanstone cryptosystem.- On ideal non-perfect secret sharing schemes.
Synopsis
This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.
LC Classification Number
QA268

Item description from the seller

About this seller

2B Read Again Books and More

100% positive feedback139 items sold

Joined Feb 2012
Bringing new life back into quality books; Saving them from being destroyed and thrown into landfills one book at a time. No wi-fi or electricity required to read a book. From continuing your ...
See more

Detailed Seller Ratings

Average for the last 12 months
Accurate description
--
Reasonable shipping cost
--
Shipping speed
--
Communication
5.0

Seller feedback (45)

All ratings
Positive
Neutral
Negative
  • 1***1 (1)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    arrived in amazing condition! I finally found all original books in one set. Excited to add to my collection. Package was secure and no damage was done during shipping. Would buy from this seller again!
  • -***0 (1)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    The item came well packaged with bubble wrap. The book was just as described by the seller. I was skeptical at first but I’m surprised how well it came in. Thanks!
  • c***c (3277)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    AWESOME SELLER !!!! AAA+++ great packaging very fast and easy transaction