- 5 Ergebnisse
Kleinster Preis: € 73,90, größter Preis: € 106,99, Mittelwert: € 94,15
1
Jianying Zhou; Robert H. Deng; Feng Bao / Information Security - Jianying Zhou, Robert H. Deng, Feng Bao
Bestellen
bei ebay.de
€ 106,99
Versand: € 0,001
Bestellengesponserter Link
Jianying Zhou, Robert H. Deng, Feng Bao:

Jianying Zhou; Robert H. Deng; Feng Bao / Information Security - neues Buch

2005, ISBN: 9783540290018

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought… Mehr…

100.0, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express. Versandkosten:Versandkostenfrei, Versand zum Fixpreis, [SHT: Versand zum Sonderpreis], 87*** Füssen, [TO: Deutschland, Österreich] (EUR 0.00) bms_buchmusikspiel
2
Information Security ISC 2005 | 8th International Conference, ISC 2005, Singapore, September 2005, Proceedings | Jianying Zhou (u. a.) | Taschenbuch | Lecture Notes in Computer Science | Englisch - Zhou, Jianying
Bestellen
bei booklooker.de
€ 73,90
Versand: € 0,001
Bestellengesponserter Link

Zhou, Jianying:

Information Security ISC 2005 | 8th International Conference, ISC 2005, Singapore, September 2005, Proceedings | Jianying Zhou (u. a.) | Taschenbuch | Lecture Notes in Computer Science | Englisch - Taschenbuch

2005, ISBN: 9783540290018

[ED: Taschenbuch], [PU: Springer Berlin], This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20t… Mehr…

Versandkosten:Versandkostenfrei. (EUR 0.00) preigu
3
Information Security ISC 2005 / 8th International Conference, ISC 2005, Singapore, September 2005, Proceedings / Jianying Zhou (u. a.) / Taschenbuch / Lecture Notes in Computer Science / Englisch - Zhou, Jianying
Bestellen
bei booklooker.de
€ 75,90
Versand: € 0,001
Bestellengesponserter Link
Zhou, Jianying:
Information Security ISC 2005 / 8th International Conference, ISC 2005, Singapore, September 2005, Proceedings / Jianying Zhou (u. a.) / Taschenbuch / Lecture Notes in Computer Science / Englisch - Taschenbuch

2005

ISBN: 9783540290018

[ED: Taschenbuch], [PU: Springer Berlin], This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20t… Mehr…

Versandkosten:Versandkostenfrei. (EUR 0.00) Buchbär
4
Information Security - Jianying Zhou; Robert H. Deng; Feng Bao
Bestellen
bei lehmanns.de
€ 106,99
Versand: € 0,001
Bestellengesponserter Link
Jianying Zhou; Robert H. Deng; Feng Bao:
Information Security - Erstausgabe

2005, ISBN: 9783540290018

Taschenbuch

8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, Buch, Softcover, [PU: Springer Berlin], [ED: 1], Springer Berlin, 2005

Versandkosten:Versand in 10-14 Tagen. (EUR 0.00)
5
Bestellen
bei lehmanns.de
€ 106,99
Versand: € 29,951
Bestellengesponserter Link
Jianying Zhou; Robert H. Deng; Feng Bao:
Information Security - Taschenbuch

2005, ISBN: 9783540290018

8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2005

Versandkosten:sofort lieferbar. (EUR 29.95)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Information Security

This book constitutes the refereed proceedings of the 8th International Information Security Conference, ISC 2005, held in Singapore in September 2005. The 33 revised full papers presented together with 5 student papers were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on network security, trust and privacy, key management and protocols, public key encryption and signature, signcryption, crypto algorithm and analysis, cryptography, applications, software security, authorization, and access control.

Detailangaben zum Buch - Information Security


EAN (ISBN-13): 9783540290018
ISBN (ISBN-10): 354029001X
Taschenbuch
Erscheinungsjahr: 2005
Herausgeber: Springer Berlin

Buch in der Datenbank seit 2007-06-04T20:58:04+02:00 (Vienna)
Detailseite zuletzt geändert am 2023-03-09T01:17:44+01:00 (Vienna)
ISBN/EAN: 9783540290018

ISBN - alternative Schreibweisen:
3-540-29001-X, 978-3-540-29001-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: robert lopez, zhou
Titel des Buches: computer security, singapore, security 2005, information security, international proceedings, september, zhou, deng


Daten vom Verlag:

Autor/in: Jianying Zhou; Robert H. Deng; Feng Bao
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security - 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
Verlag: Springer; Springer Berlin
520 Seiten
Erscheinungsjahr: 2005-09-12
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 520 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Algorithms; Public Key; algorithm; cryptography; data security; information; network security; privacy; security; trust; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Operating Systems; Algorithms; Computers and Society; IT Operations; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Algorithmen und Datenstrukturen; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; EA

Network Security I.- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.- SVision: A Network Host-Centered Anomaly Visualization Technique.- Trust & Privacy.- Time-Based Release of Confidential Information in Hierarchical Settings.- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience.- A Privacy Preserving Rental System.- Key Management & Protocols.- Constant Round Dynamic Group Key Agreement.- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms.- On the Notion of Statistical Security in Simulatability Definitions.- Public Key Encryption & Signature.- Certificateless Public Key Encryption Without Pairing.- Tracing-by-Linking Group Signatures.- Chaum’s Designated Confirmer Signature Revisited.- Network Security II.- gore: Routing-Assisted Defense Against DDoS Attacks.- IPSec Support in NAT-PT Scenario for IPv6 Transition.- Signcryption.- Hybrid Signcryption Schemes with Outsider Security.- Analysis and Improvement of a Signcryption Scheme with Key Privacy.- Efficient and Proactive Threshold Signcryption.- Crypto Algorithm & Analysis.- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?.- Hardware Architecture and Cost Estimates for Breaking SHA-1.- On the Security of Tweakable Modes of Operation: TBC and TAE.- A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.- Cryptography.- Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.- An Oblivious Transfer Protocol with Log-Squared Communication.- Applications.- Electronic Voting: Starting Over?.- Timed-Release Encryption with Pre-open Capabilityand Its Application to Certified E-mail System.- Universally Composable Time-Stamping Schemes with Audit.- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.- Software Security.- Building a Cryptovirus Using Microsoft’s Cryptographic API.- On the Security of the WinRAR Encryption Method.- Towards Better Software Tamper Resistance.- Authorization & Access Control.- Device-Enabled Authorization in the Grey System.- Evaluating Access Control Policies Through Model Checking.- A Cryptographic Solution for General Access Control.- Student Papers.- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.- A Formal Definition for Trust in Distributed Systems.- A Practical Voting Scheme with Receipts.- New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Includes supplementary material: sn.pub/extras

Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:

Neuestes ähnliches Buch:
9780444892195 INFORMATION SECURITY (LINDSAY, David T & PRICE, Wyn L [editors])


< zum Archiv...