Information Security and Privacy: 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings: Lecture Notes in Computer Science, cartea 1841
Editat de Ed Dawson, Andrew Clark, Colin Boyden Limba Engleză Paperback – 28 iun 2000
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 403.56 lei
Puncte Express: 605
Preț estimativ în valută:
71.40€ • 84.18$ • 62.01£
71.40€ • 84.18$ • 62.01£
Carte tipărită la comandă
Livrare economică 23 martie-06 aprilie
Specificații
ISBN-13: 9783540677420
ISBN-10: 3540677429
Pagini: 504
Ilustrații: XIII, 488 p.
Dimensiuni: 155 x 233 x 26 mm
Greutate: 1.16 kg
Ediția:2000
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540677429
Pagini: 504
Ilustrații: XIII, 488 p.
Dimensiuni: 155 x 233 x 26 mm
Greutate: 1.16 kg
Ediția:2000
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Network Security I.- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.- Towards a New Authorisation Paradigm for Extranets.- Custom Safety Policies in Safe Erlang.- Public Key Cryptography.- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.- Network Security II.- High Performance Agile Crypto Modules.- A Three-Party HTTP Proxy to Support Internet Content Regulation.- Cryptographic Implementation Issues.- Cryptanalysis of the m – Permutation Protection Schemes.- An Implementation of Bitsliced DES on the Pentium MMXTM Processor.- Electronic Commerce I.- Securing Large E-Commerce Networks.- Passive Entities: A Strategy for Electronic Payment Design.- Key Recovery.- Key Recovery System for the Commercial Environment.- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.- Public Key Infrastructure.- Key Management for Secure Multicast with Dynamic Controller.- PKI Seeks a Trusting Relationship.- The PKI Specification Dilemma: A Formal Solution.- Boolean Functions.- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.- Security Weaknesses in a Randomized Stream Cipher.- Two-Stage Optimisation in the Design of Boolean Functions.- Intrusion Detection.- A Novel Engine for Various Intrusion Detection Methods.- Codes.- Construction and Categories of Codes.- Digital Signatures I.- Cryptanalysis of Polynomial Authentication and Signature Scheme.- Secure Transactions with Mobile Agents in Hostile Environments.- A Multisignature Scheme with Message Flexibility, Order Flexibilityand Order Verifiability.- Secret Sharing I.- Light Weight Broadcast Exclusion Using Secret Sharing.- Cheating Prevention in Secret Sharing.- On Multiplicative Secret Sharing Schemes.- Digital Signatures II.- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.- Fail-Stop Confirmer Signatures.- An Extremely Small and Efficient Identification Scheme.- Protocols.- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.- AKA Protocols for Mobile Communications.- Electronic Commerce II.- A Three Phased Schema for Sealed Bid Auction System Design.- An Online Public Auction Protocol Protecting Bidder Privacy.- Secret Sharing II.- Algorithms to Speed Up Computations in Threshold RSA.- Sharing Block Ciphers.- Keynote Papers.- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce.- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society.
Caracteristici
Includes supplementary material: sn.pub/extras