Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers: Lecture Notes in Computer Science, cartea 6054
Editat de Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebéen Limba Engleză Hardback – 10 aug 2010
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 318.48 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 23 aug 2016 | 318.48 lei 6-8 săpt. | |
| Hardback (1) | 320.24 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 10 aug 2010 | 320.24 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 15%
Preț: 558.12 lei - 20%
Preț: 573.45 lei - 20%
Preț: 330.54 lei - 20%
Preț: 620.33 lei - 20%
Preț: 400.77 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 629.71 lei - 20%
Preț: 328.94 lei - 20%
Preț: 375.72 lei - 20%
Preț: 568.70 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 489.11 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 782.57 lei - 20%
Preț: 336.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 850.42 lei - 20%
Preț: 432.78 lei - 20%
Preț: 342.61 lei - 20%
Preț: 631.96 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 487.46 lei - 20%
Preț: 400.17 lei - 20%
Preț: 984.64 lei - 20%
Preț: 556.96 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 793.92 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 679.09 lei - 20%
Preț: 558.53 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 560.93 lei - 20%
Preț: 324.19 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 735.28 lei - 20%
Preț: 373.80 lei -
Preț: 395.25 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 320.24 lei
Preț vechi: 400.30 lei
-20%
Puncte Express: 480
Preț estimativ în valută:
56.62€ • 67.30$ • 49.12£
56.62€ • 67.30$ • 49.12£
Carte tipărită la comandă
Livrare economică 12-26 martie
Specificații
ISBN-13: 9783642149917
ISBN-10: 364214991X
Pagini: 268
Ilustrații: X, 257 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.43 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 364214991X
Pagini: 268
Ilustrații: X, 257 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.43 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
WLC Preface.- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.- Lighten Encryption Schemes for Secure and Private RFID Systems.- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.- Reliable Food Traceability Using RFID Tagging.- Lightweight Cryptography and DPA Countermeasures: A Survey.- Securing the Use of RFID-Enabled Banknotes.- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.- RLCPS Preface.- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.- A Secure and Privacy-Preserving Targeted Ad-System.- Cryptographic Cloud Storage.- Extending IPsec for Efficient Remote Attestation.- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions.- How to Evaluate the Security of Real-Life Cryptographic Protocols?.- WECSR Preface.- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals.- A Case Study on Measuring Statistical Data in the Tor Anonymity Network.- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.- Ethical Proactive Threat Research.- A Framework for Understanding and Applying Ethical Principles in Network and Security Research.- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects.- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.
Caracteristici
State-of-the-art research Fast-track conference proceedings Unique visibility