Creased spine. Secure pages, solid binding. There is an apple sticker on the spine. Stock photos may not look exactly like the book.
Printing in English language. But Contents are same as US Edition. Satisfaction Guaranteed.
This book has hardback covers. With usual stamps and markings, In fair condition, suitable as a study copy. No dust jacket. Re-bound by library.
Applied cryptography : protocols, algorithms, and source code in C in SearchWorks catalog
Wiley, Ships with Tracking Number! May not contain Access Codes or Supplements. May be ex-library. Buy with confidence, excellent customer service! We're sorry - this copy is no longer available. More tools Find sellers with multiple copies Add to want list. Didn't find what you're looking for?
Add to want list. Are you a frequent reader or book collector? Social responsibility Did you know that since , Biblio has used its profits to build 12 public libraries in rural villages of South America?
Share This Paper. Topics from this paper.
Applied cryptography : protocols, algorithms, and source code in C
Public-key cryptography Encryption Cryptosystem. Need to know Electronic signature. Citations Publications citing this paper. Connelly , Andrew A. Framework for privacy-aware content distribution in peer-to- peer networks with copyright protection Amna Qureshi. Scalable and approximate privacy-preserving record linkage Dinusha Vatsalan. Peer , Stephen B. References Publications referenced by this paper. Learn Program with Visual Basic. Higher Education and Professional Books. Computing and Information Technology Books.
Enter pincode. Usually delivered in days?
- Mathematics and the Laws of Nature: Developing the Language of Science.
- Antarctica: An Intimate Portrait of a Mysterious Continent.
- A Non-Freaked Out Guide to Teaching the Common Core: Using the 32 Literacy Anchor Standards to Develop College- and Career-Ready Students.
Schneier Bruice. Mittal Books 3. Frequently Bought Together. Applied Cryptography. Cryptography and Network Security. Add 3 Items to Cart.
Rate Product. If you are interested in network security you know that you got to have sound knowledge of cryptography