Cantitate/Preț
Produs

Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings: Lecture Notes in Computer Science, cartea 6633

Editat de Claudio Agostino Ardagna, Jianying Zhou
en Limba Engleză Paperback – 12 mai 2011
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32655 lei

Preț vechi: 40819 lei
-20% Nou

Puncte Express: 490

Preț estimativ în valută:
5780 6738$ 5055£

Carte tipărită la comandă

Livrare economică 20 ianuarie-03 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642210396
ISBN-10: 3642210392
Pagini: 420
Ilustrații: XIII, 392 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.61 kg
Ediția:2011
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.

Caracteristici

State-of-the-art research Fast-track conference proceedings Unique visibility