Communications and Multimedia Security
Editat de Bart De Decker, Ingrid Schaumüller-Bichlen Limba Engleză Paperback – 20 mai 2010
Preț: 320.97 lei
Preț vechi: 401.21 lei
-20% Nou
Puncte Express: 481
Preț estimativ în valută:
56.80€ • 66.60$ • 49.88£
56.80€ • 66.60$ • 49.88£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642132407
ISBN-10: 3642132405
Pagini: 296
Ilustrații: XIII, 281 p. 74 illus.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642132405
Pagini: 296
Ilustrații: XIII, 281 p. 74 illus.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynotes.- Keynotes.- WiFi and RF Security.- A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks.- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.- XML and Web Services Security.- Throwing a MonkeyWrench into Web Attackers Plans.- Security in OpenSocial-Instrumented Social Networking Services.- Security for XML Data Binding.- Watermarking and Multimedia Security.- Watermark Detection for Video Bookmarking Using Mobile Phone Camera.- Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking.- Analysis and Detection of Malicious Code and Risk Management.- Statistical Detection of Malicious PE-Executables for Fast Offline Analysis.- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC).- Business and IT Continuity Benchmarking.- VoIP Security.- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks.- SIP Proxies: New Reflectors in the Internet.- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal.- Biometrics.- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication.- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction.- Privacy Preserving Key Generation for Iris Biometrics.- Applied Cryptography.- Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption.- Detecting Hidden Encrypted Volumes.- Secure Communications.- Tor HTTP Usage and Information Leakage.- Secure Communication Using Identity Based Encryption.- Anonymous Client Authentication for Transport Layer Security.