Northeast Asian Views on an EAFTA -- China’s Approach to an Institutional Regional Arrangement -- East Asian Free Trade Agreement: Strategic Aspects for Japan -- Evaluation of Recent Progress of FTAs in East Asia — A Korean Perspective -- Southeast Asian Views on an EAFTA -- An East Asian FTA: A New Frontier of Economic Cooperation in East Asia -- Indonesia’s FTA Policy and Its Perspectiv…
Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to t…
Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Enc…
hal. 237-238
Gambar berwarna Teks dalam 2 bahasa: Korea dan Inggris ; Rp. 553.100,-
Gambar berwarna Teks dalam 2 bahasa: Korea dan Inggris ; Rp. 553.100,-
Gambar berwarna Teks dalam 2 bahasa: Korea dan Inggris ; Rp. 553.100,-
Gambar berwarna Teks dalam 2 bahasa: Korea dan Inggris ; Rp. 553.100,-