Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings - nouveau livre
2007, ISBN: 3540754954
2007 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptologie, Kodierungstheorie und Verschlüsselung (Kryptologie), Netzwerk-Hardware, Betriebs… Plus…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Frais d'envoiVersandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2007, ISBN: 9783540754954
Livres de poche
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the… Plus…
booklooker.de |
Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Livres de poche
2007, ISBN: 9783540754954
Springer, 2007-11-28. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-11-28, 3
Biblio.co.uk |
Information Security Conference: 10th International Conference, Isc 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings - Livres de poche
2007, ISBN: 9783540754954
Springer-Verlag New York Inc, 2007. Paperback. New. 1st edition. 436 pages. 9.00x6.00x1.00 inches., Springer-Verlag New York Inc, 2007, 6
Biblio.co.uk |
Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Livres de poche
2007, ISBN: 9783540754954
Springer, 2007-11-28. Paperback. Used: Good., Springer, 2007-11-28, 2.5
Biblio.co.uk |
Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings - nouveau livre
2007, ISBN: 3540754954
2007 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptologie, Kodierungstheorie und Verschlüsselung (Kryptologie), Netzwerk-Hardware, Betriebs… Plus…
2007, ISBN: 9783540754954
Livres de poche
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the… Plus…
Information Security: 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Livres de poche
2007
ISBN: 9783540754954
Springer, 2007-11-28. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-11-28, 3
Information Security Conference: 10th International Conference, Isc 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings - Livres de poche
2007, ISBN: 9783540754954
Springer-Verlag New York Inc, 2007. Paperback. New. 1st edition. 436 pages. 9.00x6.00x1.00 inches., Springer-Verlag New York Inc, 2007, 6
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Information Security
EAN (ISBN-13): 9783540754954
ISBN (ISBN-10): 3540754954
Version reliée
Livre de poche
Date de parution: 2007
Editeur: Springer Berlin
437 Pages
Poids: 0,687 kg
Langue: eng/Englisch
Livre dans la base de données depuis 2008-01-02T00:15:55+01:00 (Zurich)
Page de détail modifiée en dernier sur 2022-05-09T21:53:40+02:00 (Zurich)
ISBN/EAN: 9783540754954
ISBN - Autres types d'écriture:
3-540-75495-4, 978-3-540-75495-4
Autres types d'écriture et termes associés:
Auteur du livre: garay, lenstra, lens, masahiro
Titre du livre: 10th, valparaiso, chile, information security, international conference computer science, xii international conference, october, val, conference proceedings, valparaíso
Données de l'éditeur
Auteur: Juan Garay; Arjen K. Lenstra; Masahiro Mambo; Rene Peralta
Titre: Security and Cryptology; Lecture Notes in Computer Science; Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings
Editeur: Springer; Springer Berlin
440 Pages
Date de parution: 2007-09-20
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 440 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Access Control; Applied Cryptography; Authentication; Cryptographic Algorithms; Cryptographic Protocols; Denial of Service; Economics of Security and Privacy; Foundations of Computer Security; PKI and PMI; Security of Gri; Watermarking; cryptography; data security; information; security; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Operating Systems; Algorithms; Special Purpose and Application-Based Systems; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Algorithmen und Datenstrukturen; Wissensbasierte Systeme, Expertensysteme; EA
Intrusion Detection.- Detecting System Emulators.- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.- E-NIPS: An Event-Based Network Intrusion Prediction System.- Digital Rights Management.- Enabling Fairer Digital Rights Management with Trusted Computing.- Traitor Tracing with Optimal Transmission Rate.- Symmetric-Key Cryptography.- The Security of Elastic Block Ciphers Against Key-Recovery Attacks.- Impossible-Differential Attacks on Large-Block Rijndael.- High-Speed Pipelined Hardware Architecture for Galois Counter Mode.- Cryptographic Protocols and Schemes.- Efficient Committed Oblivious Transfer of Bit Strings.- An Efficient Certified Email Protocol.- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.- Identify-Based Cryptography.- Identity-Based Proxy Re-encryption Without Random Oracles.- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.- Cryptanalysis.- Small Private-Exponent Attack on RSA with Primes Sharing Bits.- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.- Network Security.- Queue Management as a DoS Counter-Measure?.- Software Obfuscation.- On the Concept of Software Obfuscation in Computer Security.- Specifying Imperative Data Obfuscations.- Public-Key Cryptosystems.- Token-Controlled Public Key Encryption in the Standard Model.- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems.- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring.- Towards a DL-Based Additively Homomorphic EncryptionScheme.- Elliptic Curves and Applications.- Differential Properties of Elliptic Curves and Blind Signatures.- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation.- Database Security and Privacy.- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.- Efficient Negative Databases from Cryptographic Hash Functions.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9780444892195 INFORMATION SECURITY (LINDSAY, David T & PRICE, Wyn L [editors])
- 9780444892195 INFORMATION SECURITY (LINDSAY, David T & PRICE, Wyn L [editors])
- 9783540754961 Information Security (Juan Garay; Arjen K. Lenstra; Masahiro Mambo; Rene Peralta)
- 9780133589627 Information Security (Jim Breithaupt; Mark S. Merkow)
- 9780071784351 Information Security (The Complete Reference) (Rhodes-Ousley, Mark)
< pour archiver...