Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6434
Editat de Isao Echizen, Noboru Kunihiro, Ryoichi Sasakien Limba Engleză Paperback – 29 oct 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 325.30 lei
Preț vechi: 406.63 lei
-20%
Puncte Express: 488
Preț estimativ în valută:
57.51€ • 66.63$ • 49.73£
57.51€ • 66.63$ • 49.73£
Carte disponibilă
Livrare economică 16-30 aprilie
Specificații
ISBN-13: 9783642168246
ISBN-10: 3642168248
Pagini: 388
Ilustrații: XIII, 371 p. 83 illus.
Greutate: 0.58 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642168248
Pagini: 388
Ilustrații: XIII, 371 p. 83 illus.
Greutate: 0.58 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Automating Security Configuration and Administration: An Access Control Perspective.- Security Metrics and Security Investment Models.- Encryption.- Publishing Upper Half of RSA Decryption Exponent.- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples.- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme.- Data and Web Security.- Practical Universal Random Sampling.- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints.- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.- Validating Security Policy Conformance with WS-Security Requirements.- Protocols.- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.- Network Security.- A Generic Binary Analysis Method for Malware.- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs.- Securing MANET Multicast Using DIPLOMA.- Block Cipher.- Preimage Attacks against Variants of Very Smooth Hash.- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification.- Mutual Information Analysis under the View of Higher-Order Statistics.- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.- Implementation and Real Life Security.- Differential Addition in Generalized Edwards Coordinates.- Efficient Implementation of Pairing on BREW Mobile Phones.- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases.- Optimal Adversary Behaviorfor the Serial Model of Financial Attack Trees.
Caracteristici
Fast track conference proceeding Unique visibility State of the art research