System Security.- Stream Cipher.- Analysis.- Key Exchange Protocol.- Elliptic Curve Cryptography.- Authentication.- Attribute-Based Encryption.- Mobile Security.- Theory.- Implementation.- Privacy and Indistinguishability.
System Security.- Stream Cipher.- Analysis.- Key Exchange Protocol.- Elliptic Curve Cryptography.- Authentication.- Attribute-Based Encryption.- Mobile Security.- Theory.- Implementation.- Privacy and Indistinguishability.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
Share This Book: