- 0 Ergebnisse
Kleinster Preis: € 83,90, größter Preis: € 123,04, Mittelwert: € 109,31
1
Computer Security - ESORICS 2010  15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings  Dimitris Gritzalis (u. a.)  Taschenbuch  Englisch - Gritzalis, Dimitris
Bestellen
bei booklooker.de
€ 83,90
Versand: € 0,001
Bestellen
gesponserter Link
Gritzalis, Dimitris:

Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings Dimitris Gritzalis (u. a.) Taschenbuch Englisch - Taschenbuch

2010, ISBN: 9783642154966

[ED: Taschenbuch], [PU: Springer Berlin], The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the intern… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchbär
2
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ... Computer Science / Security and Cryptology)
Bestellen
bei awesomebooks.com
£ 90,69
(ca. € 104,59)
Versand: € 3,451
Bestellen
gesponserter Link
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ... Computer Science / Security and Cryptology) - neues Buch

2010, ISBN: 9783642154966

The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-qualit… Mehr…

No. 9783642154966. Versandkosten:2, (EUR 3.45)
3
Bestellen
bei Thalia.de
€ 111,99
Versand: € 0,001
Bestellen
gesponserter Link
Springer Berlin:
Computer Security - ESORICS 2010 - Taschenbuch

2010

ISBN: 9783642154966

The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-qualit… Mehr…

Nr. 23397029. Versandkosten:, Sofort lieferbar, DE. (EUR 0.00)
4
Computer Security - ESORICS 2010 - Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
Bestellen
bei Springer.com
€ 123,04
Versand: € 0,001
Bestellen
gesponserter Link
Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou:
Computer Security - ESORICS 2010 - Taschenbuch

2010, ISBN: 9783642154966

The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-qualit… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00)
5
Computer Security - ESORICS 2010 - Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
Bestellen
bei lehmanns.de
€ 123,04
Versand: € 0,001
Bestellen
gesponserter Link
Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou:
Computer Security - ESORICS 2010 - Taschenbuch

2010, ISBN: 9783642154966

15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010

Versandkosten:sofort lieferbar. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.
Details zum Buch
Computer Security - ESORICS 2010

This book constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September 2010. The 42 papers included in the book were carefully reviewed and selected from 201 papers. The articles are organized in topical sections on RFID and Privacy, Software Security, Cryptographic Protocols, Traffic Analysis, End-User Security, Formal Analysis, E-voting and Broadcast, Authentication, Access Control, Authorization and Attestation, Anonymity and Unlinkability, Network Security and Economics, as well as Secure Update, DOS and Intrustion Detection.

Detailangaben zum Buch - Computer Security - ESORICS 2010


EAN (ISBN-13): 9783642154966
ISBN (ISBN-10): 3642154964
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2010
Herausgeber: Springer Berlin
718 Seiten
Gewicht: 1,037 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2009-03-19T06:06:05+01:00 (Vienna)
Detailseite zuletzt geändert am 2021-11-23T12:28:03+01:00 (Vienna)
ISBN/EAN: 9783642154966

ISBN - alternative Schreibweisen:
3-642-15496-4, 978-3-642-15496-6


Daten vom Verlag:

Autor/in: Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
Titel: Lecture Notes in Computer Science; Security and Cryptology; Computer Security - ESORICS 2010 - 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
Verlag: Springer; Springer Berlin
718 Seiten
Erscheinungsjahr: 2010-08-30
Berlin; Heidelberg; DE
Sprache: Englisch
123,04 € (DE)
126,49 € (AT)
153,65 CHF (CH)
Available
XIV, 718 p. 163 illus.

BC; Book; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; access control; anonymity; authorization; e-voting; intrusion detection; privacy; security; trust; algorithm analysis and problem complexity; C; Computer Communication Networks; Cryptology; Programming Techniques; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computers and Society; Computer Communication Networks; Cryptology; Programming Techniques; IT Operations; Algorithms; Computers and Society; Computer Science; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Computerprogrammierung und Softwareentwicklung; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; Digital- und Informationstechnologien: soziale und ethische Aspekte; EA

RFID and Privacy.- A New Framework for RFID Privacy.- Readers Behaving Badly.- Privacy-Preserving, Taxable Bank Accounts.- Formal Analysis of Privacy for Vehicular Mix-Zones.- Software Security.- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.- A Theory of Runtime Enforcement, with Results.- Enforcing Secure Object Initialization in Java.- Flexible Scheduler-Independent Security.- Cryptographic Protocols.- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic.- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols.- Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.- DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.- Traffic Analysis.- Website Fingerprinting and Identification Using Ordered Feature Sequences.- Web Browser History Detection as a Real-World Privacy Threat.- On the Secrecy of Spread-Spectrum Flow Watermarks.- Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.- End-User Security.- A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.- Kamouflage: Loss-Resistant Password Management.- Formal Analysis.- Sequential Protocol Composition in Maude-NPA.- Verifying Security Property of Peer-to-Peer Systems Using CSP.- Modeling and Analyzing Security in the Presence of Compromising Adversaries.- On Bounding Problems of Quantitative Information Flow.- E-voting and Broadcast.- On E-Vote Integrity in the Case of Malicious Voter Computers.- Election Verifiability in Electronic Voting Protocols.- Pretty Good Democracy for More Expressive Voting Schemes.- Efficient Multi-dimensional Key Management in Broadcast Services.- Authentication, Access Control, Authorization and Attestation.- Caught in the Maze of Security Standards.- User-Role Reachability Analysis of Evolving Administrative Role Based Access Control.- An Authorization Framework Resilient to Policy Evaluation Failures.- Optimistic Fair Exchange with Multiple Arbiters.- Anonymity and Unlinkability.- Speaker Recognition in Encrypted Voice Streams.- Evaluating Adversarial Partitions.- Providing Mobile Users’ Anonymity in Hybrid Networks.- Complexity of Anonymity for Security Protocols.- Network Security and Economics.- k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.- Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.- RatFish: A File Sharing Protocol Provably Secure against Rational Users.- A Service Dependency Model for Cost-Sensitive Intrusion Response.- Secure Update, DOS and Intrustion Detection.- Secure Code Update for Embedded Devices via Proofs of Secure Erasure.- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks.- Low-Cost Client Puzzles Based on Modular Exponentiation.- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.

< zum Archiv...