Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4318
Editat de Helger Lipmaa, Moti Yung, Donghai Linen Limba Engleză Paperback – 13 noi 2006
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 374.91 lei
Puncte Express: 562
Preț estimativ în valută:
66.30€ • 78.61$ • 57.73£
66.30€ • 78.61$ • 57.73£
Carte tipărită la comandă
Livrare economică 31 martie-14 aprilie
Specificații
ISBN-13: 9783540496083
ISBN-10: 3540496084
Pagini: 324
Ilustrații: XII, 308 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.45 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540496084
Pagini: 324
Ilustrații: XII, 308 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.45 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Digital Signature Schemes.- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05.- Identity-Based Key-Insulated Signature with Secure Key-Updates.- Efficient Intrusion-Resilient Signatures Without Random Oracles.- Sequences and Stream Ciphers.- New Constructions of Large Binary Sequences Family with Low Correlation.- On the Rate of Coincidence of Two Clock-Controlled Combiners.- Symmetric-Key Cryptography.- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining.- OPMAC: One-Key Poly1305 MAC.- A General Construction of Tweakable Block Ciphers and Different Modes of Operations.- Cryptographic Schemes.- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.- Efficient Short Signcryption Scheme with Public Verifiability.- A Revocation Scheme Preserving Privacy.- Network Security.- Deterministic Packet Marking with Link Signatures for IP Traceback.- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System.- A Network Security Policy Model and Its Realization Mechanism.- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.- Access Control.- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty.- Design and Implementation of Fast Access Control That Supports the Separation of Duty.- Computer and Applications Security.- A Practical Alternative to Domain and Type Enforcement Integrity Formal Models.- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks.- Application and Evaluation of Bayesian Filter for Chinese Spam.- Web and Media Security.- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.-An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses.- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.