Security Protocols XVIII
Editat de Bruce Christianson, James Malcolmen Limba Engleză Paperback – 5 dec 2014
Preț: 320.16 lei
Preț vechi: 400.20 lei
-20% Nou
Puncte Express: 480
Preț estimativ în valută:
56.66€ • 66.45$ • 49.68£
56.66€ • 66.45$ • 49.68£
Carte tipărită la comandă
Livrare economică 26 ianuarie-09 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783662459201
ISBN-10: 3662459205
Pagini: 280
Ilustrații: XII, 267 p. 19 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.43 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3662459205
Pagini: 280
Ilustrații: XII, 267 p. 19 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.43 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Introduction: Virtually Perfect Security (Transcript of Discussion).- Caught in the Maze of Security Standards.- Caught in the Maze of Security Standards (Transcript of Discussion).- Blood in the Water: Are There Honeymoon Effects Outside Software?.- Blood in the Water (Transcript of Discussion).- Digital Immolation: New Directions for Online Protest.- Digital Immolation (Transcript of Discussion).- Relay-Proof Channels Using UWB Lasers.- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion).- Using Dust Clouds to Enhance Anonymous Communication.- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion).- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract).- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion).- Censorship-Resilient Communications through Information Scattering.- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion).- On Storing Private Keys in the Cloud.- On Storing Private Keys in the Cloud (Transcript of Discussion).- More Security or Less Insecurity.- More Security or Less Insecurity (Transcript of Discussion).- It’s the Anthropology, Stupid!.- It’s the Anthropology, Stupid! (Transcript of Discussion).- Security Design in Human Computation Games.- Security Design in Human Computation Games (Transcript of Discussion).- Virtually Perfect Democracy.- Virtually Perfect Democracy (Transcript of Discussion).- Security Protocols for Secret Santa.- Security Protocols for Secret Santa (Transcript of Discussion).- Censorship of eBooks (Extended Abstract).- Censorship of eBooks (Transcript of Discussion).- On the Value of Hybrid Security Testing.- On the Value of Hybrid Security Testing (Transcript of Discussion).- Security Made, Not Perfect, But Automatic.- Security Made, Not Perfect, But Automatic (Transcript of Discussion).- Security Limitations of Virtualization and How to Overcome Them.- Security Limitations ofVirtualization and How to Overcome Them (Transcript of Discussion).- Recapitulation.