Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6434
Editat de Isao Echizen, Noboru Kunihiro, Ryoichi Sasakien Limba Engleză Paperback – 29 oct 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 270.68 lei - 20%
Preț: 321.68 lei - 20%
Preț: 391.36 lei - 20%
Preț: 322.09 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 463.03 lei - 20%
Preț: 531.75 lei - 15%
Preț: 496.40 lei - 20%
Preț: 497.25 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei - 20%
Preț: 324.19 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 390.42 lei - 20%
Preț: 497.75 lei - 20%
Preț: 326.81 lei - 20%
Preț: 322.32 lei - 20%
Preț: 390.42 lei - 20%
Preț: 458.84 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 320.72 lei
Preț: 325.30 lei
Preț vechi: 406.63 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.56€ • 67.13$ • 50.54£
57.56€ • 67.13$ • 50.54£
Carte disponibilă
Livrare economică 25 decembrie 25 - 08 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642168246
ISBN-10: 3642168248
Pagini: 388
Ilustrații: XIII, 371 p. 83 illus.
Greutate: 0.58 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642168248
Pagini: 388
Ilustrații: XIII, 371 p. 83 illus.
Greutate: 0.58 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Automating Security Configuration and Administration: An Access Control Perspective.- Security Metrics and Security Investment Models.- Encryption.- Publishing Upper Half of RSA Decryption Exponent.- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples.- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme.- Data and Web Security.- Practical Universal Random Sampling.- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints.- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.- Validating Security Policy Conformance with WS-Security Requirements.- Protocols.- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.- Network Security.- A Generic Binary Analysis Method for Malware.- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs.- Securing MANET Multicast Using DIPLOMA.- Block Cipher.- Preimage Attacks against Variants of Very Smooth Hash.- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification.- Mutual Information Analysis under the View of Higher-Order Statistics.- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.- Implementation and Real Life Security.- Differential Addition in Generalized Edwards Coordinates.- Efficient Implementation of Pairing on BREW Mobile Phones.- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases.- Optimal Adversary Behaviorfor the Serial Model of Financial Attack Trees.
Caracteristici
Fast track conference proceeding Unique visibility State of the art research