Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings: Communications in Computer and Information Science, cartea 76
Editat de Samir Kumar Bandyopadhyay, Wael Adi, Tai-hoon Kim, Yang Xiaoen Limba Engleză Paperback – 9 iun 2010
Din seria Communications in Computer and Information Science
- 20%
Preț: 423.55 lei - 20%
Preț: 460.54 lei - 20%
Preț: 579.53 lei - 20%
Preț: 458.31 lei - 20%
Preț: 313.10 lei - 20%
Preț: 643.20 lei - 20%
Preț: 312.30 lei - 20%
Preț: 324.99 lei - 20%
Preț: 630.84 lei - 20%
Preț: 634.45 lei - 20%
Preț: 321.17 lei - 20%
Preț: 324.68 lei - 20%
Preț: 631.00 lei - 20%
Preț: 631.31 lei - 20%
Preț: 633.83 lei -
Preț: 377.68 lei - 20%
Preț: 388.30 lei - 20%
Preț: 317.05 lei -
Preț: 371.37 lei - 20%
Preț: 323.23 lei - 20%
Preț: 423.73 lei - 20%
Preț: 321.81 lei - 20%
Preț: 319.13 lei - 20%
Preț: 630.51 lei - 20%
Preț: 325.61 lei - 20%
Preț: 321.17 lei - 20%
Preț: 321.81 lei - 20%
Preț: 325.79 lei - 20%
Preț: 640.83 lei - 20%
Preț: 323.23 lei - 20%
Preț: 325.79 lei - 20%
Preț: 317.68 lei - 20%
Preț: 635.26 lei - 15%
Preț: 623.39 lei - 20%
Preț: 628.32 lei - 20%
Preț: 319.42 lei - 20%
Preț: 324.99 lei - 20%
Preț: 1014.25 lei - 20%
Preț: 804.07 lei - 20%
Preț: 529.54 lei - 20%
Preț: 631.31 lei - 20%
Preț: 1183.08 lei - 20%
Preț: 494.98 lei - 20%
Preț: 388.26 lei - 20%
Preț: 318.67 lei - 20%
Preț: 389.14 lei - 20%
Preț: 323.23 lei - 20%
Preț: 458.73 lei - 20%
Preț: 530.40 lei - 20%
Preț: 632.09 lei
Preț: 322.61 lei
Preț vechi: 403.26 lei
-20% Nou
Puncte Express: 484
Preț estimativ în valută:
57.09€ • 66.94$ • 50.13£
57.09€ • 66.94$ • 50.13£
Carte disponibilă
Livrare economică 27 ianuarie-10 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642133640
ISBN-10: 3642133649
Pagini: 350
Ilustrații: 350 p. 151 illus.
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642133649
Pagini: 350
Ilustrații: 350 p. 151 illus.
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition.- Security Improvement on a Remote User Authentication Scheme Using Smart Cards.- Dual-Byte-Marker Algorithm for Detecting JFIF Header.- Hiding Data in JPEG Using in-DQT Technique.- An Analysis of Syndrome Coding.- Intrusion Correlation Using Ontologies and Multi-agent Systems.- Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN.- Fault Attacks against the Miller’s Algorithm in Edwards Coordinates.- A Cryptosystem for Encryption and Decryption of Long Confidential Messages.- Lane Design for Speed Optimization.- Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.- IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach.- Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.- Pattern Recognition Using Artificial Neural Network: A Review.- PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks.- Tracing Potential School Shooters in the Digital Sphere.- Infrastructure Aided Privacy Preserving-Authentication in VANETs.- Attacks on Bluetooth Security Architecture and Its Countermeasures.- Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.- Security Risks of Cloud Computing and Its Emergence as 5th Utility Service.- Performance Evaluation of Video Streaming in Vehicular Adhoc Network.- Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network.- Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.- MPLS Unleashed: Remedy Using IPSEC over MPLS VPN.- A New Holistic Security Approach for Government CriticalSystems: Flooding Prevention.- Sensor Aided Authentication.- Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection.- TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones.- An Improved EKG-Based Key Agreement Scheme for Body Area Networks.- Multi-agent Reinforcement Learning Model for Effective Action Selection.
Caracteristici
Up-to-date results Fast track conference proceedings State-of-the-art report