Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings: Lecture Notes in Computer Science, cartea 4752
Editat de Hiroaki Kikuchi, Kai Rannenbergen Limba Engleză Paperback – 8 oct 2007
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 385.99 lei
Nou
Puncte Express: 579
Preț estimativ în valută:
68.30€ • 80.09$ • 59.98£
68.30€ • 80.09$ • 59.98£
Carte tipărită la comandă
Livrare economică 06-20 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540756507
ISBN-10: 3540756507
Pagini: 478
Ilustrații: XIV, 462 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.73 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540756507
Pagini: 478
Ilustrații: XIV, 462 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.73 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Software and Multimedia Security.- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.- Design Issues of an Isolated Sandbox Used to Analyze Malwares.- Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique.- Public-Key Cryptography (1).- Reduction Optimal Trinomials for Efficient Software Implementation of the ? T Pairing.- Experiments on the Linear Algebra Step in the Number Field Sieve.- Batch Pairing Delegation.- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM.- A Global Authentication Scheme for Mobile Ad-Hoc Networks.- An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks.- Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.- Run-Time Randomization to Mitigate Tampering.- Privacy-Preserving Eigentaste-Based Collaborative Filtering.- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.- Verifiable Internet Voting Solving Secure Platform Problem.- Enforcement of Integrated Security Policy in Trusted Operating Systems.- Salvia: A Privacy-Aware Operating System for Prevention of Data Leakage.- InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs.- Public-Key Cryptography (2).- Accredited Symmetrically Private Information Retrieval.- Generic Certificateless Encryption in the Standard Model.- On Security Models and Compilers for Group Key Exchange Protocols.- Processing Multi-parameter Attacktrees with Estimated Parameter Values.- Practical Security Analysis of E-Voting Systems.- Fine-Grained Sticky Provenance Architecture for Office Documents.- Secure Anonymous Communications withPractical Anonymity Revocation Scheme.- GAS: Overloading a File Sharing Network as an Anonymizing System.- A Composite Privacy Protection Model.- Nominative Signature from Ring Signature.- Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.- How to Find Many Collisions of 3-Pass HAVAL.- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.