Information Security and Cryptology - ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers: Lecture Notes in Computer Science, cartea 5984
Editat de Donghoon Lee, Seokhie Hongen Limba Engleză Paperback – 12 iul 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 326.55 lei
Preț vechi: 408.19 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
57.78€ • 67.76$ • 50.75£
57.78€ • 67.76$ • 50.75£
Carte disponibilă
Livrare economică 14-28 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642144226
ISBN-10: 3642144225
Pagini: 400
Ilustrații: XIII, 387 p. 70 illus.
Greutate: 0.61 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642144225
Pagini: 400
Ilustrații: XIII, 387 p. 70 illus.
Greutate: 0.61 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Key Management and Key Exchange.- Generic One Round Group Key Exchange in the Standard Model.- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.- Efficient Certificateless KEM in the Standard Model.- Public Key Cryptography.- Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing.- Factoring Unbalanced Moduli with Known Bits .- Algebraic Cryptanalysis and Stream Cipher.- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared.- MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals.- Improved Linear Cryptanalysis of SOSEMANUK.- Security Management and Efficient Implementation.- Serial Model for Attack Tree Computations.- Lightweight Cryptography and RFID: Tackling the Hidden Overheads.- Side Channel Attack.- Power Analysis of Single-Rail Storage Elements as Used in MDPL.- A Timing Attack against Patterson Algorithm in the McEliece PKC.- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.- Privacy Enhanced Technology.- First CPIR Protocol with Data-Dependent Computation.- Efficient Fuzzy Matching and Intersection on Private Datasets.- Efficient Privacy-Preserving Face Recognition.- Cryptographic Protocol.- Linear, Constant-Rounds Bit-Decomposition.- Attacking and Repairing the Improved ModOnions Protocol.- Secret Handshakes with Revocation Support.- Cryptanalysis of Hash Function.- Practical Rebound Attack on 12-Round Cheetah-256.- Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash.- Improved Preimage Attack for 68-Step HAS-160.- Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1.- Network Security.- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson.- Analysis ofthe Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth.
Caracteristici
Up-to-date results Fast track conference proceedings State-of-the-art report