Information and Communications Security: 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings: Lecture Notes in Computer Science, cartea 6476
Editat de Miguel Soriano, Sihan Qing, Javier Lópezen Limba Engleză Paperback – 9 dec 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei - 20%
Preț: 791.54 lei - 20%
Preț: 633.70 lei - 20%
Preț: 984.64 lei - 20%
Preț: 782.57 lei - 20%
Preț: 558.53 lei - 20%
Preț: 562.49 lei - 20%
Preț: 487.46 lei - 20%
Preț: 400.77 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 556.96 lei - 20%
Preț: 560.93 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 1079.23 lei - 15%
Preț: 672.87 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 478.59 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 620.33 lei - 20%
Preț: 731.97 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 560.93 lei - 20%
Preț: 735.28 lei - 20%
Preț: 748.63 lei - 20%
Preț: 560.11 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 850.42 lei - 20%
Preț: 679.09 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 631.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei - 20%
Preț: 403.00 lei
Preț: 330.54 lei
Preț vechi: 413.16 lei
-20%
Puncte Express: 496
Preț estimativ în valută:
58.45€ • 67.02$ • 50.52£
58.45€ • 67.02$ • 50.52£
Carte disponibilă
Livrare economică 06-20 aprilie
Specificații
ISBN-13: 9783642176494
ISBN-10: 3642176496
Pagini: 488
Ilustrații: XIV, 474 p. 120 illus.
Greutate: 0.73 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642176496
Pagini: 488
Ilustrații: XIV, 474 p. 120 illus.
Greutate: 0.73 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptographic Hash Functions: Theory and Practice.- Cryptographic Hash Functions: Theory and Practice.- Session 1A. Access Control.- Rewriting of SPARQL/Update Queries for Securing Data Access.- Fine-Grained Disclosure of Access Policies.- Session 1B. Public Key Cryptography and Cryptanalysis.- Manger’s Attack Revisited.- Horizontal Correlation Analysis on Exponentiation.- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.- Session 1C. Security in Distributed and Mobile Systems.- A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks.- CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.- SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.- Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol.- Compromise-Resilient Anti-jamming for Wireless Sensor Networks.- Session 1D. Cryptanalysis.- On Practical Second-Order Power Analysis Attacks for Block Ciphers.- Consecutive S-box Lookups: A Timing Attack on SNOW 3G.- Session 2A. Authentication.- Efficient Authentication for Mobile and Pervasive Computing.- Security Enhancement and Modular Treatment towards Authenticated Key Exchange.- Federated Secret Handshakes with Support for Revocation.- Session 2B. Fair Exchange Protocols.- An Agent-Mediated Fair Exchange Protocol.- A New Method for Formalizing Optimistic Fair Exchange Protocols.- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.- Session 2C. Anonymity and Privacy.- Proving Coercion-Resistance of Scantegrity II.- Anonymity and Verifiability in Voting: Understanding (Un)Linkability.- A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms.- Time Warp: How Time Affects Privacy in LBSs.- Session 2D. Software Security.- Return-Oriented Rootkit without Returns (on the x86).- Experimental Threat Model Reuse with Misuse Case Diagrams.- Automatically Generating Patch in Binary ProgramsUsing Attribute-Based Taint Analysis.- Session 3A. Proxy Cryptosystems.- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.- Ciphertext Policy Attribute-Based Proxy Re-encryption.- Session 3B. Intrusion Detection Systems.- Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks.- A Trust-Based IDS for the AODV Protocol.- IDS Alert Visualization and Monitoring through Heuristic Host Selection.- A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Caracteristici
Unique visibility State-of-the-art survey Fast-track conference proceedings