Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3650
Editat de Jianying Zhou, Robert H. Deng, Feng Baoen Limba Engleză Paperback – 12 sep 2005
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 386.52 lei
Nou
Puncte Express: 580
Preț estimativ în valută:
68.40€ • 80.20$ • 60.07£
68.40€ • 80.20$ • 60.07£
Carte tipărită la comandă
Livrare economică 04-18 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540290018
ISBN-10: 354029001X
Pagini: 534
Ilustrații: XII, 520 p.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.74 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354029001X
Pagini: 534
Ilustrații: XII, 520 p.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.74 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Network Security I.- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.- SVision: A Network Host-Centered Anomaly Visualization Technique.- Trust & Privacy.- Time-Based Release of Confidential Information in Hierarchical Settings.- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience.- A Privacy Preserving Rental System.- Key Management & Protocols.- Constant Round Dynamic Group Key Agreement.- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms.- On the Notion of Statistical Security in Simulatability Definitions.- Public Key Encryption & Signature.- Certificateless Public Key Encryption Without Pairing.- Tracing-by-Linking Group Signatures.- Chaum’s Designated Confirmer Signature Revisited.- Network Security II.- gore: Routing-Assisted Defense Against DDoS Attacks.- IPSec Support in NAT-PT Scenario for IPv6 Transition.- Signcryption.- Hybrid Signcryption Schemes with Outsider Security.- Analysis and Improvement of a Signcryption Scheme with Key Privacy.- Efficient and Proactive Threshold Signcryption.- Crypto Algorithm & Analysis.- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?.- Hardware Architecture and Cost Estimates for Breaking SHA-1.- On the Security of Tweakable Modes of Operation: TBC and TAE.- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.- Cryptography.- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.- An Oblivious Transfer Protocol with Log-Squared Communication.- Applications.- Electronic Voting: Starting Over?.- Timed-Release Encryption with Pre-open Capabilityand Its Application to Certified E-mail System.- Universally Composable Time-Stamping Schemes with Audit.- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.- Software Security.- Building a Cryptovirus Using Microsoft’s Cryptographic API.- On the Security of the WinRAR Encryption Method.- Towards Better Software Tamper Resistance.- Authorization & Access Control.- Device-Enabled Authorization in the Grey System.- Evaluating Access Control Policies Through Model Checking.- A Cryptographic Solution for General Access Control.- Student Papers.- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.- A Formal Definition for Trust in Distributed Systems.- A Practical Voting Scheme with Receipts.- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Caracteristici
Includes supplementary material: sn.pub/extras