- 5 Risultati
prezzo più basso: € 53,49, prezzo più alto: € 55,60, prezzo medio: € 54,21
1
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers - Yung, Moti (Herausgeber); Sohn, Kiwook (Herausgeber)
Ordina
da Achtung-Buecher.de
€ 55,60
Spedizione: € 0,001
OrdinaLink sponsorizzato
Yung, Moti (Herausgeber); Sohn, Kiwook (Herausgeber):

Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers - nuovo libro

2009, ISBN: 3642003052

2009 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Altro …

Costi di spedizione:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
2
Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Kiwook So
Ordina
da BarnesandNoble.com
€ 54,99
OrdinaLink sponsorizzato
Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Kiwook So - nuovo libro

2008, ISBN: 9783642003059

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Altro …

new in stock. Costi di spedizione:zzgl. Versandkosten., Costi di spedizione aggiuntivi
3
Information Security Applications
Ordina
da Springer.com
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato
Information Security Applications - nuovo libro

2008

ISBN: 9783642003059

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Altro …

Nr. 978-3-642-00305-9. Costi di spedizione:Worldwide free shipping, , DE. (EUR 0.00)
4
Information Security Applications
Ordina
da Hugendubel.de
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato
Information Security Applications - edizione con copertina flessibile

2009, ISBN: 9783642003059

*Information Security Applications* - 9th International Workshop WISA 2008 Jeju Island Korea September 23-25 2008 Revised Selected Papers. Auflage 2009 / Taschenbuch für 53.49 € / Aus dem… Altro …

Costi di spedizione:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
5
Information Security Applications
Ordina
da Hugendubel.de
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato
Information Security Applications - edizione con copertina flessibile

2009, ISBN: 9783642003059

*Information Security Applications* - 9th International Workshop WISA 2008 Jeju Island Korea September 23-25 2008 Revised Selected Papers. Auflage 2009 / Taschenbuch für 53.49 € / Aus dem… Altro …

Costi di spedizione:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)

1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.

Dati bibliografici del miglior libro corrispondente

Dettagli del libro
Information Security Applications

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.

Informazioni dettagliate del libro - Information Security Applications


EAN (ISBN-13): 9783642003059
ISBN (ISBN-10): 3642003052
Copertina rigida
Copertina flessibile
Anno di pubblicazione: 2009
Editore: Springer Berlin Heidelberg
334 Pagine
Peso: 0,532 kg
Lingua: eng/Englisch

Libro nella banca dati dal 2008-11-19T05:49:17+01:00 (Zurich)
Pagina di dettaglio ultima modifica in 2024-02-27T15:32:24+01:00 (Zurich)
ISBN/EAN: 9783642003059

ISBN - Stili di scrittura alternativi:
3-642-00305-2, 978-3-642-00305-9
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : chung, sohn, söhn, yung
Titolo del libro: island 2008, selected papers, information security, going out korea, whither korea, september island


Dati dell'editore

Autore: Kiwook Sohn; Moti Yung
Titolo: Lecture Notes in Computer Science; Security and Cryptology; Information Security Applications - 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
Editore: Springer; Springer Berlin
334 Pagine
Anno di pubblicazione: 2009-02-13
Berlin; Heidelberg; DE
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XI, 334 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Broadcast; Protection; access control; anonymity; authentication; bilinear pairing; block ciphers; broadcast encryption; certificate-based; cryptanalysis; cryptographic hardware; cryptographic protocols; digital forensic; security; algorithm analysis and problem complexity; Cryptology; Data and Information Security; Computer Communication Networks; Algorithms; IT Operations; Special Purpose and Application-Based Systems; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; EA

Smart Card and Secure Hardware(1).- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation.- Template Attacks on ECDSA.- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool.- Wireless and Sensor Network Security(1).- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network.- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.- Securing Layer-2 Path Selection in Wireless Mesh Networks.- Public Key Crypto Applications.- Public Key Authentication with Memory Tokens.- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.- Privacy and Anonymity.- Sanitizable and Deletable Signature.- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.- N/W Security and Intrusion Detection.- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512.- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.- Application Security and Trust Management.- Image-Feature Based Human Identification Protocols on Limited Display Devices.- Ternary Subset Difference Method and Its Quantitative Analysis.- Data Deletion with Provable Security.- Smart Card and Secure Hardware(2).- A Probing Attack on AES.- On Avoiding ZVP-Attacks Using Isogeny Volcanoes.- Security Analysisof DRBG Using HMAC in NIST SP 800-90.- Wireless and Sensor Network Security(2).- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.- An Improved Distributed Key Management Scheme in Wireless Sensor Networks.- Protection Profile for Connected Interoperable DRM Framework.

< Per archiviare...