ISBN: 9783642386312
Computer Science; Systems and Data Security; Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; e-Commerce/e-business RFID, attribute-based… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten Details... |
2013, ISBN: 9783642386312
Network and System Security:7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings Network and System Security:7th International Conference, NSS 2013, Madrid, … Mehr…
Hugendubel.de No. 25103774 Versandkosten:zzgl. Versandkosten Details... |
ISBN: 9783642386312
Computer Science; Systems and Data Security; Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; e-Commerce/e-business RFID, attribute-based… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
2013, ISBN: 9783642386312
7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg, 2013
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
Network and System Security : 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings - neues Buch
2013, ISBN: 9783642386312
; EPUB; Computing > Computer security, Random House Publishers India Pvt. Ltd.
hive.co.uk No. 9783642386312. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
ISBN: 9783642386312
Computer Science; Systems and Data Security; Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; e-Commerce/e-business RFID, attribute-based… Mehr…
2013, ISBN: 9783642386312
Network and System Security:7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings Network and System Security:7th International Conference, NSS 2013, Madrid, … Mehr…
ISBN: 9783642386312
Computer Science; Systems and Data Security; Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; e-Commerce/e-business RFID, attribute-based… Mehr…
2013, ISBN: 9783642386312
7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg, 2013
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Network and System Security
EAN (ISBN-13): 9783642386312
Erscheinungsjahr: 2013
Herausgeber: Springer Berlin Heidelberg
Buch in der Datenbank seit 2016-08-05T16:35:06+02:00 (Vienna)
Detailseite zuletzt geändert am 2021-05-08T15:11:14+02:00 (Vienna)
ISBN/EAN: 9783642386312
ISBN - alternative Schreibweisen:
978-3-642-38631-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: huang, lopez
Titel des Buches: spain madrid
Daten vom Verlag:
Autor/in: Javier Lopez; Xinyi Huang; Ravi Sandhu
Titel: Lecture Notes in Computer Science; Security and Cryptology; Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings
Verlag: Springer; Springer Berlin
793 Seiten
Erscheinungsjahr: 2013-05-27
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XX, 793 p. 207 illus.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Computersicherheit; Verstehen; RFID; attribute-based signature; computer networks; encryption; vehicular ad-hoc networks; C; Data and Information Security; Computer Communication Networks; Cryptology; IT Operations; e-Commerce and e-Business; Computer Science; Netzwerksicherheit; Netzwerk-Hardware; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; E-Commerce: geschäftliche Aspekte; BC
Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.- A Technology Independent Security Gateway for Real-Time Multimedia Communication.- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.- Model the Influence of Sybil Nodes in P2P Botnets.- Network Security: Security Protocols and Practice A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.- The OffPAD: Requirements and Usage.- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.- Using Trusted Platform Modules for Location Assurance in Cloud Networking.- Network Security: Network Attacks and Defense Tracing Sources of Anonymous Slow Suspicious Activities.- Static Analysis for Regular Expression Denial-of-Service Attacks.- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.- System Security: Malware and Intrusions MADS: Malicious Android Applications Detection through String Analysis.- X-TIER: Kernel Module Injection.- Leveraging String Kernels for Malware Detection.- Insiders Trapped in the Mirror Reveal Themselves in Social Media.- System Security: Applications Security On Business Logic Vulnerabilities Hunting: The APP LogGIC Framework.- Using the Smart Card Web Server in Secure Branchless Banking.- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.- Efficient and Private Three-Party Publish/Subscribe.- System Security: Security Algorithms and Systems Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms.- Forward Secure Certificateless Proxy Signature Scheme.- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.- On the Security of an Efficient Attribute-Based Signature.- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.- Performance Prediction Model for Block Ciphers on GPU Architectures.- Threshold-Oriented Optimistic Fair Exchange.- Secure Storage and Fuzzy Query over Encrypted Databases.- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.- Privacy Preserving Context Aware Publish Subscribe Systems.- A New Unpredictability-Based RFID Privacy Model.- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.- Key Agreement and Distribution Light Weight Network Coding Based Key Distribution Scheme for MANETs.- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.- Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks.- Human Identification with Electroencephalogram (EEG) for the Future Network Security.- Building Better Unsupervised Anomaly Detector with S-Transform.- Fault-Tolerant Topology Control Based on Artificial Immune in WMNs.- Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.- On the Use of Key Assignment Schemes in Authentication Protocols.- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems.- Security Authentication of AODV Protocols in MANETs.- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.- Towards a Privacy-Preserving Solution for OSNs.- Measuring and Comparing the Protection Quality in Different Operating Systems.- Collusion-Resistant Domain-Specific Pseudonymous Signatures.- On the Applicability of Time-Driven Cache Attacks on Mobile Devices.- Ancestor Excludable Hierarchical ID-Based Encryption Revisited.- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.- Distributed and Anonymous Publish-Subscribe.- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs.- Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments.- Filtering Trolling Comments through Collective Classification.- Security Analysis of Touch Inputted Passwords: A Preliminary Study Based on the Resistance against Brute Force Attacks.- A Pairing-Free Identity Based Authentication Framework for Cloud Computing.- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.- Towards a More Secure Apache Hadoop HDFS Infrastructure: Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures.- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR.- A Comprehensive Access Control System for Scientific Applications.- Partial Fingerprint Reconstruction with Improved Smooth Extension.- Modeling and Analysis for Thwarting Worm Propagation in Email Networks.- On Secure and Power-Efficient RFID-Based Wireless Body Area Network.- Towards Authenticated Objects.- A Finger-Vein Based Cancellable Bio-cryptosystem.Conference proceedings of the International Conference on Network and System Security
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
2900124166898 Network and System Security (John R. Vacca)
< zum Archiv...