Information Security and Cryptology - ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings - neues Buch
2006, ISBN: 3540491120
2006 Kartoniert / Broschiert Biometrie, Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptologie, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathe… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2006, ISBN: 9783540491125
9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings This book constitutes the refereed proceedings of the 9th International Conference on Information S… Mehr…
CampusRitter.de |
2006, ISBN: 9783540491125
Information Security and Cryptology ICISC 2006 ab 79.99 € als Taschenbuch: 9th International Conference Busan Korea November 30 - December 1 2006 Proceedings. Auflage 2006. Aus dem Bereic… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Security and Cryptology - ICISC 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Taschenbuch
2006, ISBN: 3540491120
[EAN: 9783540491125], Neubuch, [PU: Springer], Books
AbeBooks.de Ergodebooks, Richmond, TX, U.S.A. [8304062] [Rating: 5 (von 5)] NEW BOOK. Versandkosten: EUR 8.25 Details... |
2006, ISBN: 9783540491125
; Scientific, Technical & Medical, Springer
awesomebooks.com No. 9783540491125. Versandkosten:1, (EUR 3.46) Details... |
Information Security and Cryptology - ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings - neues Buch
2006, ISBN: 3540491120
2006 Kartoniert / Broschiert Biometrie, Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptologie, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathe… Mehr…
2006, ISBN: 9783540491125
9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings This book constitutes the refereed proceedings of the 9th International Conference on Information S… Mehr…
2006
ISBN: 9783540491125
Information Security and Cryptology ICISC 2006 ab 79.99 € als Taschenbuch: 9th International Conference Busan Korea November 30 - December 1 2006 Proceedings. Auflage 2006. Aus dem Bereic… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Cryptology ICISC 2006
EAN (ISBN-13): 9783540491125
ISBN (ISBN-10): 3540491120
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2006
Herausgeber: Springer Berlin Heidelberg
358 Seiten
Gewicht: 0,562 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-02-09T12:07:53+01:00 (Vienna)
Detailseite zuletzt geändert am 2023-03-04T09:15:58+01:00 (Vienna)
ISBN/EAN: 9783540491125
ISBN - alternative Schreibweisen:
3-540-49112-0, 978-3-540-49112-5
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: rhee, springer, min
Titel des Buches: computer security, information security cryptology icisc 2003, information security cryptology icisc 2006, busan korea, going out korea, whither korea, proceedings international conference, november 1923 1933
Daten vom Verlag:
Autor/in: Min Surp Rhee; Byoungcheon Lee
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2006 - 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings
Verlag: Springer; Springer Berlin
362 Seiten
Erscheinungsjahr: 2006-11-14
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 362 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; RSA; Radio-Frequency Identification (RFID); Routing; authentication; biometrics; block ciphers; collision; communication; cryptanalysis; cryptographic algorithms; cryptographic attacks; cryptographic primitives; cryptography; cryptology; privacy; algorithm analysis and problem complexity; Cryptology; Discrete Mathematics in Computer Science; Data and Information Security; IT Operations; Algorithms; Computer Communication Networks; Kryptografie, Verschlüsselungstechnologie; Mathematik für Informatiker; Diskrete Mathematik; Computersicherheit; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; Netzwerk-Hardware; EA
Invited Talks.- RFID Privacy Based on Public-Key Cryptography.- Generic Attacks on Symmetric Ciphers.- Hash Functions – I.- Improved Collision Attack on the Hash Function Proposed at PKC’98.- Hashing with Polynomials.- Birthday Paradox for Multi-collisions.- Block and Stream Ciphers.- New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.- On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher.- On Algebraic Immunity and Annihilators.- Efficient Implementation and Hardware.- High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem.- A High-Speed Square Root Algorithm in Extension Fields.- The Smallest ARIA Module with 16-Bit Architecture.- A Simpler Sieving Device: Combining ECM and TWIRL.- Network Security and Access Control.- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.- A Time-Frame Based Trust Model for P2P Systems.- Spatial Context in Role-Based Access Control.- Mobile Communications Security.- An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks.- Mobile RFID Applications and Security Challenges.- Forensics.- An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time.- Copyright Protection.- A Copy Protection Technique Using Multi-level Error Coding.- Digital Rights Management with Right Delegation for Home Networks.- Biometrics.- Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM.- Hash Functions – II.- Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction.- Cryptanalysis of T-Function-Based Hash Functions.- Collision Search Attack for 53-Step HAS-160.- Public Key Cryptosystems.- Klein BottleRouting: An Alternative to Onion Routing and Mix Network.- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle.- Digital Signatures.- A New Proxy Signature Scheme Providing Self-delegation.- Extended Sanitizable Signatures.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783540491149 Information Security and Cryptology – ICISC 2006 (Min Surp Rhee#Byoungcheon Lee)
- 9783540491149 Information Security and Cryptology – ICISC 2006 (Min Surp Rhee#Byoungcheon Lee)
- 9783319121604 Information Security and Cryptology -- ICISC 2013 (Hyang-Sook Lee; Dong-Guk Han)
- 9783540320838 Information Security and Cryptology - ICISC 2004 (Seongtaek Chee; Choonsik Park)
- 9783642215186 Information Security and Cryptology (Xuejia Lai; Moti Yung; Dongdai Lin)
< zum Archiv...