Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6434
Editat de Isao Echizen, Noboru Kunihiro, Ryoichi Sasakien Limba Engleză Paperback – 29 oct 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 325.30 lei
Preț vechi: 406.63 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.56€ • 67.50$ • 50.55£
57.56€ • 67.50$ • 50.55£
Carte disponibilă
Livrare economică 22 ianuarie-05 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642168246
ISBN-10: 3642168248
Pagini: 388
Ilustrații: XIII, 371 p. 83 illus.
Greutate: 0.58 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642168248
Pagini: 388
Ilustrații: XIII, 371 p. 83 illus.
Greutate: 0.58 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Automating Security Configuration and Administration: An Access Control Perspective.- Security Metrics and Security Investment Models.- Encryption.- Publishing Upper Half of RSA Decryption Exponent.- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples.- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme.- Data and Web Security.- Practical Universal Random Sampling.- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints.- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.- Validating Security Policy Conformance with WS-Security Requirements.- Protocols.- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.- Network Security.- A Generic Binary Analysis Method for Malware.- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs.- Securing MANET Multicast Using DIPLOMA.- Block Cipher.- Preimage Attacks against Variants of Very Smooth Hash.- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification.- Mutual Information Analysis under the View of Higher-Order Statistics.- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.- Implementation and Real Life Security.- Differential Addition in Generalized Edwards Coordinates.- Efficient Implementation of Pairing on BREW Mobile Phones.- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases.- Optimal Adversary Behaviorfor the Serial Model of Financial Attack Trees.
Caracteristici
Fast track conference proceeding Unique visibility State of the art research