Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4266
Editat de Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayamaen Limba Engleză Paperback – 11 oct 2006
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 383.23 lei
Puncte Express: 575
Preț estimativ în valută:
67.76€ • 79.89$ • 58.49£
67.76€ • 79.89$ • 58.49£
Carte tipărită la comandă
Livrare economică 19 martie-02 aprilie
Specificații
ISBN-13: 9783540476993
ISBN-10: 3540476997
Pagini: 460
Ilustrații: XIII, 438 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.66 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540476997
Pagini: 460
Ilustrații: XIII, 438 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.66 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Signatures (1).- ID-Based Ring Signature Scheme Secure in the Standard Model.- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.- Sound Computational Interpretation of Symbolic Hashes in the Standard Model.- Security Evaluation.- A Requirement Centric Framework for Information Security Evaluation.- A Model-Based Method for Security Configuration Verification.- Personal Computer Privacy: Analysis for Korean PC Users.- Signatures (2).- Short Traceable Signatures Based on Bilinear Pairings.- Ring Signature with Designated Linkability.- Ad Hoc Group Signatures.- Rateless Codes for the Multicast Stream Authentication Problem.- Authentication.- Crossing Borders: Security and Privacy Issues of the European e-Passport.- A New Approach to Hide Policy for Automated Trust Negotiation.- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.- Security for Multimedia.- A Study of Detection Method of Printed Image Alteration Using Digital Watermark.- Real-Time Watermark Embedding for High Resolution Video Watermarking.- Inhibiting Card Sharing Attacks.- Network Security.- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.- Modeling of Network Intrusions Based on the Multiple Transition Probability.- Encryption and Key Exchange.- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.- Ciphertext-Auditable Public Key Encryption.- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.- Cryptanalysis and Implementation.- On the Effectiveness of TMTO and Exhaustive Search Attacks.- Low Power AES Hardware Architecture for Radio Frequency Identification.- The High-Speed Packet Cipher System Suitable for Small Sized Data.- Access Control.- A Tool for Managing Security Policies in Organisations.- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.- The Complexity of Discretionary Access Control.- Traceroute Based IP Channel for Sending Hidden Short Messages.