Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers: Lecture Notes in Computer Science, cartea 5932
Editat de Heung Youl Youm, Moti Yungen Limba Engleză Paperback – 8 ian 2010
Din seria Lecture Notes in Computer Science
- 15%
Preț: 558.12 lei - 20%
Preț: 573.45 lei - 20%
Preț: 330.54 lei - 20%
Preț: 620.33 lei - 20%
Preț: 400.77 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 629.71 lei - 20%
Preț: 328.94 lei - 20%
Preț: 375.72 lei - 20%
Preț: 568.70 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 489.11 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 782.57 lei - 20%
Preț: 336.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 850.42 lei - 20%
Preț: 432.78 lei - 20%
Preț: 342.61 lei - 20%
Preț: 631.96 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 487.46 lei - 20%
Preț: 400.17 lei - 20%
Preț: 984.64 lei - 20%
Preț: 556.96 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 793.92 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 679.09 lei - 20%
Preț: 558.53 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 560.93 lei - 20%
Preț: 324.19 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 735.28 lei - 20%
Preț: 373.80 lei -
Preț: 395.25 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 380.46 lei
Puncte Express: 571
Preț estimativ în valută:
67.26€ • 80.67$ • 58.47£
67.26€ • 80.67$ • 58.47£
Carte tipărită la comandă
Livrare economică 13-27 martie
Specificații
ISBN-13: 9783642108372
ISBN-10: 3642108377
Pagini: 404
Ilustrații: XIII, 386 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.59 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642108377
Pagini: 404
Ilustrații: XIII, 386 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.59 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Multimedia Security.- Protecting IPTV Service Network against Malicious Rendezvous Point.- Design and Implementation of SIP-aware Security Management System.- Device Security.- Application Management Framework in User Centric Smart Card Ownership Model.- When Compromised Readers Meet RFID.- HW Implementation Security.- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?.- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.- Applied Cryptography.- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.- ID-Based Adaptive Oblivious Transfer.- Side Channel Attacks.- Unknown Plaintext Template Attacks.- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation.- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.- Cryptograptanalysis.- Finding Collisions for a 45-Step Simplified HAS-V.- Non-linear Error Detection for Finite State Machines.- Quadratic Equations from a Kind of S-boxes.- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.- Anonymity/Authentication/Access Control.- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET.- A Selectable k-Times Relaxed Anonymous Authentication Scheme.- PUF-Based Authentication Protocols – Revisited.- Mediated Ciphertext-Policy Attribute-Based Encryption andIts Application.- Network Security.- Securing Remote Access Inside Wireless Mesh Networks.- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers.- USN Middleware Security Model.- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009.
The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.
The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.