Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers - neues Buch
2008, ISBN: 9783642014406
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
hive.co.uk No. 9783642014406. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers - neues Buch
2008, ISBN: 9783642014406
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
hive.co.uk No. 9783642014406. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2008, ISBN: 9783642014406
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
Springer.com Nr. 978-3-642-01440-6. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
2008, ISBN: 9783642014406
Information Security and Cryptology - 4th International Conference Inscrypt 2008 Beijing China December 14-17 2008 Revised Selected Papers: ab 53.49 € eBooks > Sachthemen & Ratgeber > Com… Mehr…
eBook.de Versandkosten:in stock, , , DE. (EUR 0.00) Details... |
Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers - neues Buch
2008, ISBN: 9783642014406
; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg
hive.co.uk No. 9783642014406. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers - neues Buch
2008, ISBN: 9783642014406
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
Manfred Droste:
Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers - neues Buch2008, ISBN: 9783642014406
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
2008
ISBN: 9783642014406
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
2008, ISBN: 9783642014406
Information Security and Cryptology - 4th International Conference Inscrypt 2008 Beijing China December 14-17 2008 Revised Selected Papers: ab 53.49 € eBooks > Sachthemen & Ratgeber > Com… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Cryptology
EAN (ISBN-13): 9783642014406
ISBN (ISBN-10): 3642014402
Erscheinungsjahr: 2009
Herausgeber: Springer Berlin Heidelberg
13 Seiten
Sprache: eng/Englisch
Buch in der Datenbank seit 2011-12-28T07:55:17+01:00 (Vienna)
Detailseite zuletzt geändert am 2024-03-24T17:37:14+01:00 (Vienna)
ISBN/EAN: 9783642014406
ISBN - alternative Schreibweisen:
3-642-01440-2, 978-3-642-01440-6
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: bernd jähne, lin peng, yun dong
Titel des Buches: beijing 2008
Daten vom Verlag:
Autor/in: Moti Yung; Peng Liu; Dongdai Lin
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
Verlag: Springer; Springer Berlin
439 Seiten
Erscheinungsjahr: 2009-04-29
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIII, 439 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Public Key; Trusted Computing; anonymity; code; cryptography; data security; identity; information; privacy; security; trust; C; Cryptology; Coding and Information Theory; Data and Information Security; IT Operations; Computers and Society; Computer Communication Networks; Computer Science; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Computersicherheit; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Netzwerk-Hardware; BC
Invited Talks.- The State of Hash Functions and the NIST SHA-3 Competition.- Key Evolution Systems in Untrusted Update Environments.- Secure and Privacy-Preserving Information Brokering.- Digital Signature and Signcryption Schemes.- Provably Secure Convertible Nominative Signature Scheme.- Cryptanalysis of Two Ring Signcryption Schemes.- Efficient Signcryption Key Encapsulation without Random Oracles.- Privacy and Anonymity.- Strong Anonymous Signatures.- Publicly Verifiable Privacy-Preserving Group Decryption.- Privacy for Private Key in Signatures.- Message Authentication Code and Hash Function.- Security of Truncated MACs.- Security Analysis of Multivariate Polynomials for Hashing.- Secure Protocols.- SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.- Batch ZK Proof and Verification of OR Logic.- Symmetric Cryptography.- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.- Impossible Differential Analysis of Reduced Round CLEFIA.- Reducible Polynomial over Constructed by Trinomial ??LFSR.- Certificateless Cryptography.- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model.- Further Observations on Certificateless Public Key Encryption.- Hardware Implementation and Side Channel Attack.- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.- New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA.- Wireless Network Security.- A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN.- Key Predistribution Schemes Using Codes in Wireless Sensor Networks.- Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.- Public Key and Identity Based Cryptography.- On the ComputationalEfficiency of XTR+.- A Variant of Boneh-Gentry-Hamburg’s Pairing-Free Identity Based Encryption Scheme.- Inter-domain Identity-Based Proxy Re-encryption.- Access Control and Network Security.- Hardening Botnet by a Rational Botmaster.- Separation of Duty in Trust-Based Collaboration.- Trusted Computing and Applications.- An Integrity Assurance Mechanism for Run-Time Programs.- A Security and Performance Evaluation of Hash-Based RFID Protocols.- Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783319308395 Information Security and Cryptology - ICISC 2015 (Soonhak Kwon; Aaram Yun)
- 9783319121598 Information Security And Cryptology - Icisc 2013 by Hyang-Sook Lee Paperback | Indigo Chapters (Herausgegeben:Lee, Hyang-Sook; Han, Dong-Guk)
< zum Archiv...