Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings - Taschenbuch
2018, ISBN: 3030027430
[EAN: 9783030027438], Neubuch, [SC: 9.91], [PU: Springer-Verlag Gmbh Dez 2018], EDV / THEORIE SICHERHEIT; DATENSICHERHEIT NETZ; INFORMATIK; NETZWERK (ELEKTRONISCH); COMPUTER PC-HARDWARE A… Mehr…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten: EUR 9.91 Details... |
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings - Taschenbuch
2018, ISBN: 3030027430
[EAN: 9783030027438], Neubuch, [SC: 0.0], [PU: Springer-Verlag Gmbh Dez 2018], EDV / THEORIE SICHERHEIT; DATENSICHERHEIT NETZ; INFORMATIK; NETZWERK (ELEKTRONISCH); COMPUTER PC-HARDWARE AU… Mehr…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
2018, ISBN: 3030027430
[EAN: 9783030027438], Neubuch, [PU: Springer-Verlag Gmbh Dez 2018], EDV / THEORIE SICHERHEIT; DATENSICHERHEIT NETZ; INFORMATIK; NETZWERK (ELEKTRONISCH); COMPUTER PC-HARDWARE AUFRÜSTEN, RE… Mehr…
AbeBooks.de Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Germany [53870650] [Rating: 5 (von 5)] NEW BOOK. Versandkosten: EUR 9.87 Details... |
Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings - gebrauchtes Buch
2018, ISBN: 9783030027438
[PU: Springer International Publishing], 32968737/1, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 1st ed. 2018, Banküberweisung, Kreditkarte, PayPal, Klarna-Sofortüberweisun… Mehr…
booklooker.de |
2018, ISBN: 9783030027438
Taschenbuch
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings, Buch, Softcover, 1st ed. 2018, [PU: Springer International Publishing], Springer International … Mehr…
lehmanns.de Versandkosten:sofort lieferbar. (EUR 0.00) Details... |
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings - Taschenbuch
2018, ISBN: 3030027430
[EAN: 9783030027438], Neubuch, [SC: 9.91], [PU: Springer-Verlag Gmbh Dez 2018], EDV / THEORIE SICHERHEIT; DATENSICHERHEIT NETZ; INFORMATIK; NETZWERK (ELEKTRONISCH); COMPUTER PC-HARDWARE A… Mehr…
Man Ho Au:
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings - Taschenbuch2018, ISBN: 3030027430
[EAN: 9783030027438], Neubuch, [SC: 0.0], [PU: Springer-Verlag Gmbh Dez 2018], EDV / THEORIE SICHERHEIT; DATENSICHERHEIT NETZ; INFORMATIK; NETZWERK (ELEKTRONISCH); COMPUTER PC-HARDWARE AU… Mehr…
2018
ISBN: 3030027430
[EAN: 9783030027438], Neubuch, [PU: Springer-Verlag Gmbh Dez 2018], EDV / THEORIE SICHERHEIT; DATENSICHERHEIT NETZ; INFORMATIK; NETZWERK (ELEKTRONISCH); COMPUTER PC-HARDWARE AUFRÜSTEN, RE… Mehr…
Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings - gebrauchtes Buch
2018, ISBN: 9783030027438
[PU: Springer International Publishing], 32968737/1, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 1st ed. 2018, Banküberweisung, Kreditkarte, PayPal, Klarna-Sofortüberweisun… Mehr…
2018, ISBN: 9783030027438
Taschenbuch
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings, Buch, Softcover, 1st ed. 2018, [PU: Springer International Publishing], Springer International … Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Network and System Security
EAN (ISBN-13): 9783030027438
ISBN (ISBN-10): 3030027430
Taschenbuch
Erscheinungsjahr: 2018
Herausgeber: Springer International Publishing
Buch in der Datenbank seit 2018-11-01T11:19:54+01:00 (Vienna)
Detailseite zuletzt geändert am 2023-12-20T17:52:03+01:00 (Vienna)
ISBN/EAN: 9783030027438
ISBN - alternative Schreibweisen:
3-030-02743-0, 978-3-030-02743-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: castiglione, wang ming, anie, man
Titel des Buches: system china, network science, science notes
Daten vom Verlag:
Autor/in: Man Ho Au; Siu Ming Yiu; Jin Li; Xiapu Luo; Cong Wang; Aniello Castiglione; Kamil Kluczniak
Titel: Security and Cryptology; Lecture Notes in Computer Science; Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Verlag: Springer; Springer International Publishing
492 Seiten
Erscheinungsjahr: 2018-12-19
Cham; CH
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
90,94 € (DE)
93,49 € (AT)
100,50 CHF (CH)
POD
XII, 492 p. 167 illus., 117 illus. in color.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Informatik; blockchain; applied cryptography; software security; network security; IoT security; mobile security; authentication; biometrics; information privacy; data security; computer networks; internet; computer crime; telecommunication networks; cryptography; software engineering; privacy; public key cryptography; pattern recognition; World Wide Web; Data and Information Security; Legal Aspects of Computing; Computer Engineering and Networks; Computer and Information Systems Applications; Software Engineering; Artificial Intelligence; Netzwerksicherheit; Digital- und Informationstechnologien: Rechtliche Aspekte; Computerhardware; Angewandte Informatik; Software Engineering; Künstliche Intelligenz; EA
Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics.- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems.- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi.- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.- User Relationship Classication of Facebook Messenger Mobile Data using WEKA.- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.- Real-time IoT Device Activity Detection in Edge Networks.- Analysis on the Block Reward of Fork After Withholding.- DBAF: Dynamic Binary Analysis Framework and Its Applications.- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing.- Analyzing the Communication Security between Smartphones and IoT based on CORAS.- An efficient privacy preserving batch authentication scheme with deterable function for VANETs.- Using Software Visualization for Supporting the Teaching of Map Reduce.- Walking on the Cloud: Gait Recognition, a Wearable Solution.- Anonymous Attribute-Based Conditional Proxy Re-Encryption.- Burn After Reading: Expunging Execution Footprints of Android Apps.- Comprehensive Analysis of the Permissions used in Android.- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity.- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.- An OpenvSwitch Extension for SDN Traceback.- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks.- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption.- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs.- Creating and Managing Realism in the Next-Generation Cyber Range.- Deep Android Malware Detection with Adaptive Classifier Selection.- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge.- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices.- Understanding the Behaviors of BGP-based DDoS Protection Services.- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture.- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke.- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices.- Android Malware Detection Methods Based on the Combination of Clustering and Classification.- Secure Semantic Search based on Two-level Index over Encrypted Cloud.- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
2900124166898 Network and System Security (John R. Vacca)
< zum Archiv...