2001, ISBN: 9783540433194
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held a… Mehr…
Indigo.ca new in stock. Versandkosten:zzgl. Versandkosten. Details... |
2001, ISBN: 9783540433194
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held a… Mehr…
Springer.com Nr. 978-3-540-43319-4. Versandkosten:Worldwide free shipping, , plus shipping costs. (EUR 0.00) Details... |
2009, ISBN: 3540433198
Taschenbuch 476 Seiten Taschenbuch Gepflegtes ehemaliges Bibliotheksexemplar mit den üblichen Kennzeichnungen (z.B. Barcode und Inventarisierungsnummer); in der Regel foliiert (Umschlag … Mehr…
Achtung-Buecher.de |
Information Security and Cryptology - ICISC 2001 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings - neues Buch
2002, ISBN: 3540433198
2002 Kartoniert / Broschiert Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, IT-Management, Diskrete Mathematik, Algorithmen und Datenstruktu… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2002, ISBN: 9783540433194
4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings, Buch, Softcover, 2002, [PU: Springer Berlin], Springer Berlin, 2002
lehmanns.de Versandkosten:Versand in 10-14 Tagen. (EUR 0.00) Details... |
Information Security And Cryptology - Icisc 2001 by Kwangjo Kim Paperback | Indigo Chapters - neues Buch
2001, ISBN: 9783540433194
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held a… Mehr…
2001, ISBN: 9783540433194
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held a… Mehr…
2009
ISBN: 3540433198
Taschenbuch 476 Seiten Taschenbuch Gepflegtes ehemaliges Bibliotheksexemplar mit den üblichen Kennzeichnungen (z.B. Barcode und Inventarisierungsnummer); in der Regel foliiert (Umschlag … Mehr…
Information Security and Cryptology - ICISC 2001 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings - neues Buch
2002, ISBN: 3540433198
2002 Kartoniert / Broschiert Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, IT-Management, Diskrete Mathematik, Algorithmen und Datenstruktu… Mehr…
2002, ISBN: 9783540433194
4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings, Buch, Softcover, 2002, [PU: Springer Berlin], Springer Berlin, 2002
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Cryptology - ICISC 2001
EAN (ISBN-13): 9783540433194
ISBN (ISBN-10): 3540433198
Taschenbuch
Erscheinungsjahr: 2002
Herausgeber: Springer Berlin
476 Seiten
Gewicht: 0,713 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-12-06T17:08:32+01:00 (Vienna)
Detailseite zuletzt geändert am 2024-02-19T21:03:00+01:00 (Vienna)
ISBN/EAN: 9783540433194
ISBN - alternative Schreibweisen:
3-540-43319-8, 978-3-540-43319-4
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: kim
Titel des Buches: seoul, information security, international international, korea, lecture notes computer science, 2001
Daten vom Verlag:
Autor/in: Kwangjo Kim
Titel: Lecture Notes in Computer Science; Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings
Verlag: Springer; Springer Berlin
460 Seiten
Erscheinungsjahr: 2002-03-06
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 460 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; DES; Informtion security; Signcryption; Substitution; algorithms; authentication; cryptanalysis; cryptographic; cryptography; cryptology; cryptosystems; data encryption; data security; information security; systems security; algorithm analysis and problem complexity; Cryptology; Discrete Mathematics in Computer Science; IT Operations; Algorithms; Kryptografie, Verschlüsselungstechnologie; Mathematik für Informatiker; Diskrete Mathematik; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; EA
Practical Security in Public-Key Cryptography.- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.- Truncated Differential Cryptanalysis of Camellia.- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.- Decentralized Event Correlation for Intrusion Detection.- Enhancing the Security of Cookies.- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation.- Efficient Revocation Schemes for Secure Multicast.- Binary Codes for Collusion-Secure Fingerprinting.- Copyright Protection of Object-Oriented Software.- Off-Line Authentication Using Watermarks.- Slide Attacks with a Known-Plaintext Cryptanalysis.- Constructions of Cheating Immune Secret Sharing.- Private Computation with Shared Randomness over Broadcast Channel.- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.- Practical Reasoning about Accountability in Electronic Commerce Protocols.- Content Extraction Signatures.- New Signcryption Schemes Based on KCDSA.- An Efficient and Provably Secure Threshold Blind Signature.- A Multi-signature Scheme with Signers’ Intentions Secure against Active Attacks.- A Distributed Light-Weight Authentication Model for Ad-hoc Networks.- Design of an Authentication Protocol for Gsm Javacards.- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile ComputingEnvironment.- Protecting General Flexible Itineraries of Mobile Agents.- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.- DPA Countermeasure Based on the “Masking Method”.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030688899 Information Security and Cryptology ? ICISC 2020 (Deukjo Hong)
- 9783030688899 Information Security and Cryptology ? ICISC 2020 (Deukjo Hong)
- 9783030164577 Codes, Cryptology and Information Security (Herausgegeben:Nitaj, Abderrahmane; Guilley, Sylvain; Souidi, El Mamoun; Carlet, Claude)
- 9783030305291 Progress in Cryptology ? LATINCRYPT 2019 (Peter Schwabe; Nicolas Thériault)
- 9783540458616 Information Security and Cryptology - ICISC 2001 (Kwangjo Kim)
- [(Progress in Cryptology - LATINCRYPT 2012 : 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10 2012 : Proceedings)] [Edited by Alejandro Hevia ] published on (August, 2012) (Alejandro Hevia)
< zum Archiv...