- 5 Risultati
prezzo più basso: € 39,31, prezzo più alto: € 93,42, prezzo medio: € 64,13
1
Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 201
Ordina
da Indigo.ca
C$ 129,95
(indicativi € 93,42)
OrdinaLink sponsorizzato

Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 201 - nuovo libro

2010, ISBN: 9783642168246

The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter,Kobe,Japan,November22-24,2010. Thewo- shop was co-organized by CSEC, a special int… Altro …

new in stock. Costi di spedizione:zzgl. Versandkosten., Costi di spedizione aggiuntivi
2
Advances in Information and Computer Security - Isao Echizen
Ordina
da BookDepository.com
€ 69,99
Spedizione: € 0,001
OrdinaLink sponsorizzato

Isao Echizen:

Advances in Information and Computer Security - edizione con copertina flessibile

2010, ISBN: 9783642168246

Paperback, [PU: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG], This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous Com… Altro …

Costi di spedizione:Versandkostenfrei. (EUR 0.00)
3
Ordina
da buchfreund.de
€ 39,31
Spedizione: € 0,001
OrdinaLink sponsorizzato
Echizen, Isao, Noboru Kunihiro und Ryoichi Sasaki:
Advances in Information and Computer Security 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings 2010 - libri usati

2010

ISBN: 9783642168246

2010 Neubindung, Buchrücken leicht angestoßen, Buchumschlag leicht geknickt und zerkratzt 9827393/12 Versandkostenfreie Lieferung cryptanalysis,efficient decryption,group signature,comput… Altro …

Costi di spedizione:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Buchpark GmbH, 14959 Trebbin
4
Advances in Information and Computer Security 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings - Echizen, Isao, Noboru Kunihiro  und Ryoichi Sasaki
Ordina
da booklooker.de
€ 43,06
Spedizione: € 9,901
OrdinaLink sponsorizzato
Echizen, Isao, Noboru Kunihiro und Ryoichi Sasaki:
Advances in Information and Computer Security 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings - libri usati

2010, ISBN: 9783642168246

[PU: Springer Berlin], Neubindung, Buchrücken leicht angestoßen, Buchumschlag leicht geknickt und zerkratzt 9827393/12, DE, [SC: 9.90], gebraucht; sehr gut, gewerbliches Angebot, 2010, Ba… Altro …

Costi di spedizione:Versand nach Österreich. (EUR 9.90) Buchpark GmbH
5
Ordina
da lehmanns.de
€ 74,89
Spedizione: € 0,001
OrdinaLink sponsorizzato
Isao Echizen; Noboru Kunihiro; Ryoichi Sasaki:
Advances in Information and Computer Security - edizione con copertina flessibile

2010, ISBN: 9783642168246

5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010

Costi di spedizione:Titel z.Zt. nicht lieferbar. (EUR 0.00)

1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.

Dati bibliografici del miglior libro corrispondente

Dettagli del libro
Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 201

This book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in Kobe, Japan, in November 2010. The 22 revised full papers presented together with 2 invited talk were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on encryption, data and web security, protocols, network security, block cipher, and implementation and real life security.

Informazioni dettagliate del libro - Advances in Information and Computer Security: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 201


EAN (ISBN-13): 9783642168246
ISBN (ISBN-10): 3642168248
Copertina rigida
Copertina flessibile
Anno di pubblicazione: 2010
Editore: Springer Berlin
371 Pagine
Peso: 0,586 kg
Lingua: eng/Englisch

Libro nella banca dati dal 2007-09-30T16:55:01+02:00 (Zurich)
Pagina di dettaglio ultima modifica in 2024-03-12T09:01:47+01:00 (Zurich)
ISBN/EAN: 3642168248

ISBN - Stili di scrittura alternativi:
3-642-16824-8, 978-3-642-16824-6
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : sasaki, fujiwara
Titolo del libro: kobe, japan, advances computer security, proceedings from 5th, information security, international, 201


Dati dell'editore

Autore: Isao Echizen; Noboru Kunihiro; Ryoichi Sasaki
Titolo: Security and Cryptology; Lecture Notes in Computer Science; Advances in Information and Computer Security - 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings
Editore: Springer; Springer Berlin
371 Pagine
Anno di pubblicazione: 2010-10-29
Berlin; Heidelberg; DE
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 371 p. 83 illus.

BC; Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen; Mensch-Computer-Interaktion; Verstehen; Informatik; anonymity; asymmetric encryption; authentication; computer security; cryptanalysis; cryptology; data outsourcing; digital signatures; efficient decryption; elliptic curve cryptography; group signature; higher-order statistics; identity-based encryption; information security; network security; User Interfaces and Human Computer Interaction; Computers and Society; Programming Techniques; Data and Information Security; IT Operations; Cryptology; Digital- und Informationstechnologien: soziale und ethische Aspekte; Computerprogrammierung und Softwareentwicklung; Computersicherheit; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; EA

Invited Talks.- Automating Security Configuration and Administration: An Access Control Perspective.- Security Metrics and Security Investment Models.- Encryption.- Publishing Upper Half of RSA Decryption Exponent.- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples.- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.- An Improvement of Key Generation Algorithm for Gentry’s Homomorphic Encryption Scheme.- Data and Web Security.- Practical Universal Random Sampling.- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints.- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.- Validating Security Policy Conformance with WS-Security Requirements.- Protocols.- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.- Network Security.- A Generic Binary Analysis Method for Malware.- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs.- Securing MANET Multicast Using DIPLOMA.- Block Cipher.- Preimage Attacks against Variants of Very Smooth Hash.- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification.- Mutual Information Analysis under the View of Higher-Order Statistics.- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.- Implementation and Real Life Security.- Differential Addition in Generalized Edwards Coordinates.- Efficient Implementation of Pairing on BREW Mobile Phones.- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases.- Optimal Adversary Behaviorfor the Serial Model of Financial Attack Trees.
Fast track conference proceeding Unique visibility State of the art research

< Per archiviare...