Secure Information Networks
Editat de Bart Preneelen Limba Engleză Paperback – 22 ian 2013
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 1225.58 lei 6-8 săpt. | |
| Springer – 22 ian 2013 | 1225.58 lei 6-8 săpt. | |
| Hardback (1) | 1231.13 lei 6-8 săpt. | |
| Springer – 31 aug 1999 | 1231.13 lei 6-8 săpt. |
Preț: 1225.58 lei
Preț vechi: 1531.98 lei
-20% Nou
Puncte Express: 1838
Preț estimativ în valută:
216.87€ • 254.31$ • 190.46£
216.87€ • 254.31$ • 190.46£
Carte tipărită la comandă
Livrare economică 31 ianuarie-14 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475764871
ISBN-10: 1475764871
Pagini: 340
Ilustrații: XVI, 324 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.52 kg
Ediția:Softcover reprint of the original 1st ed. 1999
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 1475764871
Pagini: 340
Ilustrații: XVI, 324 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.52 kg
Ediția:Softcover reprint of the original 1st ed. 1999
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Network Security: ATM and ISDN.- Security On ATM Networks.- ISDN Security services.- An Alternative Access Control Architecture for IP over ATM Networks.- Applied Cryptology I.- Verifiable Democracy.- Efficient Oblivious Proofs of Correct Exponentiation.- Entity Authentication and Key Agreement Protocols.- Weaknesses in EHA Authentication and Key Distribution Protocol.- Formal Design of Efficient Authentication and Key-Agreement Protocols.- Applications.- On Authentication, Digital Signatures and Signature Laws.- Watermarking and Secure Distribution for Encrypted Video.- Implementing a Secure Log File Download Manager for the Java Card.- Network Security: IP.- Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks.- Secure Distributed Virtual Conferencing.- PIM-SM Security: Interdomain Issues and Solutions.- Protocols for Mobile Applications.- Attacks against the WAP WTLS protocol.- A New Authentication Protocol for Portable Communication Systems.- Token Based Authentication for Handover Security.- Applied Cryptology II.- How to Securely Broadcast a Secret.- Proofs of Work and Bread Pudding Protocols.- Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme.- Web Security.- Secure Data-Transfer for Web-Based Applications.- Using SESAME to Secure Web Based Applications on an Intranet.- Contributors.- Keywords.