Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6033
Editat de Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveronen Limba Engleză Paperback – 9 apr 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 461.83 lei - 20%
Preț: 461.57 lei - 20%
Preț: 424.26 lei - 20%
Preț: 390.69 lei - 20%
Preț: 498.50 lei - 15%
Preț: 388.50 lei - 20%
Preț: 390.35 lei - 20%
Preț: 460.98 lei - 20%
Preț: 461.52 lei - 20%
Preț: 497.55 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.83 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 391.14 lei - 20%
Preț: 389.85 lei - 20%
Preț: 461.32 lei - 20%
Preț: 498.32 lei - 20%
Preț: 496.64 lei - 20%
Preț: 532.28 lei - 20%
Preț: 527.36 lei - 20%
Preț: 498.46 lei - 15%
Preț: 461.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 532.41 lei - 20%
Preț: 462.24 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 252.15 lei - 20%
Preț: 390.94 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.86 lei - 20%
Preț: 532.54 lei - 20%
Preț: 462.67 lei - 20%
Preț: 461.65 lei - 20%
Preț: 639.72 lei - 20%
Preț: 255.91 lei - 15%
Preț: 535.92 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 499.36 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.20 lei - 20%
Preț: 249.95 lei
Preț: 326.10 lei
Preț vechi: 407.63 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.70€ • 67.83$ • 50.53£
57.70€ • 67.83$ • 50.53£
Carte tipărită la comandă
Livrare economică 28 ianuarie-11 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642123672
ISBN-10: 3642123678
Pagini: 400
Ilustrații: XIII, 386 p. 93 illus.
Greutate: 0.6 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642123678
Pagini: 400
Ilustrații: XIII, 386 p. 93 illus.
Greutate: 0.6 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Embedded Security.- Efficient and Effective Buffer Overflow Protection on ARM Processors.- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.- A Smart Card Implementation of the McEliece PKC.- Evaluation Metrics of Physical Non-invasive Security.- Protocols.- Trust in Peer-to-Peer Content Distribution Protocols.- Generic Constructions of Biometric Identity Based Encryption Systems.- Design and Analysis of a Generalized Canvas Protocol.- Highly Constrained Embedded Systems.- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.- Practical Schemes for Privacy and Security Enhanced RFID.- MoteAODV – An AODV Implementation for TinyOS 2.0.- Security.- Random Number Generation Based on Fingerprints.- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML.- Fraud Detection for Voice over IP Services on Next-Generation Networks.- Smart Card Security.- Proxy Smart Card Systems.- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?.- Website Credential Storage and Two-Factor Web Authentication with a Java SIM.- Algorithms.- Attribute-Based Encryption with Break-Glass.- On the Security of a Two-Factor Authentication Scheme.- The Design of Secure and Efficient P2PSIP Communication Systems.- Hardware Implementations.- Novel FPGA-Based Signature Matching for Deep Packet Inspection.- Towards Electrical, Integrated Implementations of SIMPL Systems.- A Very Compact Hardware Implementation of the KASUMI Block Cipher.- Embedded Systems.- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions.- Identification andVerification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.- Security Analysis of Mobile Phones Used as OTP Generators.- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.- Anonymity/Database Security.- The Market Failure of Anonymity Services.- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.- Predicting and Preventing Insider Threat in Relational Database Systems.
Caracteristici
Fast-track conference proceedings State-of-the-art research Unique visibility