- 5 Ergebnisse
Kleinster Preis: € 42,79, größter Preis: € 89,00, Mittelwert: € 66,94
1
Information Security Applications - Kiwook Sohn; Moti Yung
Bestellen
bei Springer.com
€ 59,49
Bestellengesponserter Link
Kiwook Sohn; Moti Yung:

Information Security Applications - neues Buch

2008, ISBN: 9783642003066

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Information Security Applications - 50-99.99
Bestellen
bei ebooks.com
€ 89,00
Bestellengesponserter Link

50-99.99:

Information Security Applications - neues Buch

2008, ISBN: 9783642003066

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
3
Information Security Applications
Bestellen
bei Springer.com
€ 42,79
Versand: € 0,001
Bestellengesponserter Link
Information Security Applications - neues Buch

2008

ISBN: 9783642003066

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Mehr…

Nr. 978-3-642-00306-6. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00)
4
Information Security Applications - 1st Edition (eBook)
Bestellen
bei VitalSource.com
£ 62,99
(ca. € 74,86)
Bestellengesponserter Link
Information Security Applications - 1st Edition (eBook) - neues Buch

ISBN: 9783642003066

1st Edition, by Kiwook Sohn; Moti Yung, PRINT ISBN: 9783642003059 E-TEXT ISBN: 9783642003066 Springer Nature eBook Other pricing structure might be available at vitalsource.com., Springer

new in stock United Kingdom. Versandkosten:plus shipping costs., zzgl. Versandkosten
5
Information Security Applications - Kiwook Sohn;  Moti Yung
Bestellen
bei lehmanns.de
€ 68,54
Versand: € 0,001
Bestellengesponserter Link
Kiwook Sohn; Moti Yung:
Information Security Applications - neues Buch

2009, ISBN: 9783642003066

9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, [ED: 2009], eBook Download (PDF), eBooks, [PU: Springer Berlin Heidelberg]

Versandkosten:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Information Security Applications


EAN (ISBN-13): 9783642003066
ISBN (ISBN-10): 3642003060
Erscheinungsjahr: 2009
Herausgeber: Springer Berlin Heidelberg
11 Seiten
Sprache: eng/Englisch

Buch in der Datenbank seit 2011-01-17T07:26:07+01:00 (Vienna)
Detailseite zuletzt geändert am 2023-11-26T12:44:42+01:00 (Vienna)
ISBN/EAN: 9783642003066

ISBN - alternative Schreibweisen:
3-642-00306-0, 978-3-642-00306-6
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: sohn
Titel des Buches: island per, korea kochbuch, information security, september island, september 2008


Daten vom Verlag:

Autor/in: Kiwook Sohn; Moti Yung
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security Applications - 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
Verlag: Springer; Springer Berlin
334 Seiten
Erscheinungsjahr: 2009-02-18
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XI, 334 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; AES; Broadcast; Protection; access control; anonymity; authentication; bilinear pairing; block ciphers; broadcast encryption; certificate-based; cryptanalysis; cryptographic hardware; cryptographic protocols; digital forensic; security; algorithm analysis and problem complexity; C; Cryptology; Data and Information Security; Computer Communication Networks; Algorithms; IT Operations; Special Purpose and Application-Based Systems; Computer Science; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; BC

Smart Card and Secure Hardware(1).- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation.- Template Attacks on ECDSA.- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool.- Wireless and Sensor Network Security(1).- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network.- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.- Securing Layer-2 Path Selection in Wireless Mesh Networks.- Public Key Crypto Applications.- Public Key Authentication with Memory Tokens.- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.- Privacy and Anonymity.- Sanitizable and Deletable Signature.- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.- N/W Security and Intrusion Detection.- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512.- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.- Application Security and Trust Management.- Image-Feature Based Human Identification Protocols on Limited Display Devices.- Ternary Subset Difference Method and Its Quantitative Analysis.- Data Deletion with Provable Security.- Smart Card and Secure Hardware(2).- A Probing Attack on AES.- On Avoiding ZVP-Attacks Using Isogeny Volcanoes.- Security Analysisof DRBG Using HMAC in NIST SP 800-90.- Wireless and Sensor Network Security(2).- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.- An Improved Distributed Key Management Scheme in Wireless Sensor Networks.- Protection Profile for Connected Interoperable DRM Framework.

< zum Archiv...