- 5 Ergebnisse
Kleinster Preis: € 91,62, größter Preis: € 139,00, Mittelwert: € 114,48
1
Security and Privacy in Communication Networks - >100
Bestellen
bei ebooks.com
€ 139,00
Bestellengesponserter Link
>100:

Security and Privacy in Communication Networks - neues Buch

2010, ISBN: 9783642161612

These proceedings contain the papers selected for presentation at the 6th - ternational Conference on Security and Privacy in Communication Networks - SecureComm 2010 - held on September … Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Security and Privacy in Communication Networks - Sushil Jajodia; Jianying Zhou
Bestellen
bei Springer.com
€ 91,62
Bestellengesponserter Link

Sushil Jajodia; Jianying Zhou:

Security and Privacy in Communication Networks - neues Buch

ISBN: 9783642161612

Computer Science; Computer Communication Networks; Management of Computing and Information Systems; Data Encryption; Software Engineering; Algorithm Analysis and Problem Complexity; Opera… Mehr…

  - Versandkosten:zzgl. Versandkosten.
3
Bestellen
bei lehmanns.de
€ 112,88
Versand: € 0,001
Bestellengesponserter Link
Sushil Jajodia; Jianying Zhou:
Security and Privacy in Communication Networks - neues Buch

2010

ISBN: 9783642161612

6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg… Mehr…

Versandkosten:Download sofort lieferbar. (EUR 0.00)
4
Security and Privacy in Communication Networks - Springer
Bestellen
bei Thalia.de
€ 106,99
Versand: € 0,001
Bestellengesponserter Link
Springer:
Security and Privacy in Communication Networks - neues Buch

2010, ISBN: 9783642161612

6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings eBook Springer PDF, Springer, 29.11.2010, Springer, 2010

Nr. 44259172. Versandkosten:, Sofort per Download lieferbar, DE. (EUR 0.00)
5
Security and Privacy in Communication Networks - Springer
Bestellen
bei Orellfuessli.ch
CHF 131,90
(ca. € 121,93)
Versand: € 16,641
Bestellengesponserter Link
Springer:
Security and Privacy in Communication Networks - neues Buch

2010, ISBN: 9783642161612

6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings eBook Springer 29.11.2010, Springer, Springer

Nr. 44259172. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 16.64)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Security and Privacy in Communication Networks


EAN (ISBN-13): 9783642161612
Erscheinungsjahr: 2010
Herausgeber: Springer Berlin Heidelberg

Buch in der Datenbank seit 2016-03-15T08:02:23+01:00 (Vienna)
Detailseite zuletzt geändert am 2021-08-12T11:50:01+02:00 (Vienna)
ISBN/EAN: 9783642161612

ISBN - alternative Schreibweisen:
978-3-642-16161-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Titel des Buches: security privacy networks


Daten vom Verlag:

Autor/in: Sushil Jajodia; Jianying Zhou
Titel: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks - 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings
Verlag: Springer; Springer Berlin
500 Seiten
Erscheinungsjahr: 2010-11-27
Berlin; Heidelberg; DE
Sprache: Englisch
96,29 € (DE)
99,00 € (AT)
118,00 CHF (CH)
Available
XIII, 500 p. 160 illus.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Broadcast; Host; Internet; Online; Overlay; Protection; Quorum; anonoymity; denial of service; email security; embedded systems; network security; privacy; spam; wireless security; algorithm analysis and problem complexity; C; Computer Communication Networks; Management of Computing and Information Systems; Cryptology; Software Engineering; Algorithm Analysis and Problem Complexity; Operating Systems; Computer Communication Networks; IT Operations; Cryptology; Software Engineering; Algorithms; Operating Systems; Computer Science; Wirtschaftsmathematik und -informatik, IT-Management; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Software Engineering; Algorithmen und Datenstrukturen; Betriebssysteme; BC

Malware and Email Security.- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.- Analyzing and Exploiting Network Behaviors of Malware.- Inexpensive Email Addresses An Email Spam-Combating System.- Anonymity and Privacy.- Privacy Administration in Distributed Service Infrastructure.- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.- Wireless Security.- A Study on False Channel Condition Reporting Attacks in Wireless Networks.- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.- Saving Energy on WiFi with Required IPsec.- Systems Security – I.- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.- A Generic Construction of Dynamic Single Sign-on with Strong Security.- DeCore: Detecting Content Repurposing Attacks on Clients’ Systems.- Network Security – I.- Realizing a Source Authentic Internet.- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.- Attacking Beacon-Enabled 802.15.4 Networks.- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.- Security Protocols – I.- CED2: Communication Efficient Disjointness Decision.- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.- Context-Aware Usage Control for Android.- System Security – II.- Efficient Isolation of Trusted Subsystems in Embedded Systems.- Enhancing Host Security Using External Environment Sensors.- FADE: Secure Overlay Cloud Storage with File Assured Deletion.- Security Protocols – II.- A New Information Leakage Measure for Anonymity Protocols.- Hidden Markov Models for Automated Protocol Learning.- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast.- Network Security – II.- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly.- The Hitchhiker’s Guide to DNS Cache Poisoning.- A Formal Definition of Online Abuse-Freeness.

< zum Archiv...