- 5 Résultats
prix le plus bas: € 68,48, prix le plus élevé: € 89,85, prix moyen: € 76,18
1
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - E. Bombieri
Commander
sur hive.co.uk
£ 76,50
(environ € 89,85)
CommanderLien sponsorisé
E. Bombieri:

Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - nouveau livre

2009, ISBN: 9783642108471

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Plus…

No. 9783642108471. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise
2
Security Technology - Dominik Slezak
Commander
sur Springer.com
€ 85,59
CommanderLien sponsorisé

Dominik Slezak:

Security Technology - nouveau livre

2009, ISBN: 9783642108471

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Plus…

new in stock. Frais d'envoiplus verzendkosten., Livraison non-comprise
3
Security Technology - Dominik Slezak
Commander
sur lehmanns.de
€ 68,48
Envoi: € 9,951
CommanderLien sponsorisé
Dominik Slezak:
Security Technology - nouveau livre

2009

ISBN: 9783642108471

International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings, eBooks, … Plus…

Frais d'envoiDownload sofort lieferbar. (EUR 9.95)
4
Security Technology - Dominik Slezak
Commander
sur lehmanns.de
€ 68,48
Envoi: € 0,001
CommanderLien sponsorisé
Dominik Slezak:
Security Technology - nouveau livre

2009, ISBN: 9783642108471

International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings, 2010, eB… Plus…

Frais d'envoiDownload sofort lieferbar, , Versandkostenfrei innerhalb der BRD. (EUR 0.00)
5
Security Technology - Dominik Slezak; Tai-hoon Kim; Wai-chi Fang; Kirk P. Arnett (Hrsg.)
Commander
sur lehmanns.de
€ 68,48
Envoi: € 13,951
CommanderLien sponsorisé
Dominik Slezak; Tai-hoon Kim; Wai-chi Fang; Kirk P. Arnett (Hrsg.):
Security Technology - Première édition

2009, ISBN: 9783642108471

International Conference, SecTech 2009, eBooks, eBook Download (PDF), Auflage, [PU: Springer-Verlag], [ED: 1], Springer-Verlag, 2009

Frais d'envoiDownload sofort lieferbar. (EUR 13.95)

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre

Informations détaillées sur le livre - Security Technology


EAN (ISBN-13): 9783642108471
ISBN (ISBN-10): 3642108474
Date de parution: 2009
Editeur: Springer-Verlag
13 Pages
Langue: eng/Englisch

Livre dans la base de données depuis 2011-11-19T15:58:26+01:00 (Zurich)
Page de détail modifiée en dernier sur 2023-10-04T07:49:20+02:00 (Zurich)
ISBN/EAN: 9783642108471

ISBN - Autres types d'écriture:
3-642-10847-4, 978-3-642-10847-1
Autres types d'écriture et termes associés:
Auteur du livre: slezak, weiland, fang, arn, arnett
Titre du livre: generation pro, korea kochbuch, techno


Données de l'éditeur

Auteur: Dominik Slezak
Titre: Communications in Computer and Information Science; Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
Editeur: Springer; Springer Berlin
308 Pages
Date de parution: 2009-11-28
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIII, 308 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; BitTorrent; Broadcast; Code; MIMO; Partition; authentication; behavior models; communication; cryptography; malvare detection; metrics; privacy; signatures; urban computing; wireless sensors; C; Cryptology; Computer Communication Networks; Data Structures and Information Theory; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Engineering and Networks; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Informationstheorie; Mathematik für Informatiker; Diskrete Mathematik; Computerhardware; BC

Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.

< pour archiver...