Information Security Practice and Experience: Lecture Notes in Computer Science, cartea 8434
Editat de Xinyi Huang, Jianying Zhouen Limba Engleză Paperback – 3 apr 2014
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 337.13 lei
Preț vechi: 421.41 lei
-20%
Puncte Express: 506
Preț estimativ în valută:
59.58€ • 68.76$ • 51.96£
59.58€ • 68.76$ • 51.96£
Carte tipărită la comandă
Livrare economică 18 mai-01 iunie
Specificații
ISBN-13: 9783319063195
ISBN-10: 3319063197
Pagini: 592
Ilustrații: XIV, 578 p. 131 illus.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.89 kg
Ediția:2014
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3319063197
Pagini: 592
Ilustrații: XIV, 578 p. 131 illus.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.89 kg
Ediția:2014
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
Access Control in and Around the Browser.- Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools.- Preserving Receiver-Location Privacy in Wireless Sensor Networks.- Data Security and Privacy in the Cloud.- Forbidden City Model – Towards a Practice Relevant Framework for Designing Cryptographic Protocols.- A CAPTCHA Scheme Based on the Identification of Character Locations.- A Multi process Mechanism of Evading Behavior-Based Bot Detection Approaches.- Obfuscating Encrypted Web Traffic with Combined Objects.- A Website Credibility Assessment Scheme Based on Page Association.- A Methodology for Hook-Based Kernel Level Rootkits.- Precise Instruction-Level Side Channel Profiling of Embedded Processors.- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.- SBE – A Precise Shell code Detection Engine Based on Emulation and Support Vector Machine.- HDROP: Detecting ROP Attacks Using Performance Monitoring Counters.- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs.- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit.- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm.- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis.- Implementing a Covert Timing Channel Based on Mimic Function.- Detecting Frame Deletion in H.264 Video.- Efficient Adaptive Oblivious Transfer in UC Framework.- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes.- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing.- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups.- Proofs of Retrievability Based on MRD Codes.- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.- Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.-Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.- Two-Party (Blind) Ring Signatures and Their Applications.- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model.- Attribute-Based Signature with Message Recovery.- Encryption and Key Agreement An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.- Multi-recipient Encryption in Heterogeneous Setting.- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.- Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.- New Variants of Lattice Problems and Their NP-Hardness.- Improved Preimage Attacks against Reduced HAS-160.- Modular Inversion Hidden Number Problem Revisited.- On the Recursive Construction of MDS Matrices for Lightweight Cryptography.- On Constructions of Circulant MDS Matrices for Lightweight Cryptography.