Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings - Taschenbuch
2008, ISBN: 3540883126
[EAN: 9783540883128], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG / DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE; E-BUSINESS; ELECTRONIC COMMERCE - E-COMMERCE; E-VENTURE… Mehr…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings - Taschenbuch
2008, ISBN: 3540883126
[EAN: 9783540883128], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG / DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE; E-BUSINESS; ELECTRONIC COMMERCE - E-COMMERCE; E-VENTURE… Mehr…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
2008, ISBN: 9783540883128
Kartoniert, 620 Seiten, 235mm x 155mm x 34mm, Sprache(n): eng These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Securit… Mehr…
buchfreund.de MARZIES Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 - gebrauchtes Buch
2008, ISBN: 9783540883128
2008 Neubindung, Buchecken und -kanten leicht angestossen 4774741/12 Versandkostenfreie Lieferung trust,authorization,cluster,privacy,peer-to-peer,identity management,integrity check,secu… Mehr…
buchfreund.de |
2008, ISBN: 9783540883128
*Computer Security - ESORICS 2008* - 13th European Symposium on Research in Computer Security Málaga Spain October 6-8 2008. Proceedings. Auflage 2008 / Taschenbuch für 53.49 € / Aus dem … Mehr…
Hugendubel.de Versandkosten:Kein Versand in Ihr Zielland., zzgl. Versandkosten Details... |
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings - Taschenbuch
2008, ISBN: 3540883126
[EAN: 9783540883128], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG / DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE; E-BUSINESS; ELECTRONIC COMMERCE - E-COMMERCE; E-VENTURE… Mehr…
Sushil Jajodia:
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings - Taschenbuch2008, ISBN: 3540883126
[EAN: 9783540883128], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENVERARBEITUNG / DATENVERSCHLÜSSELUNG, KRYPTOGRAFIE; E-BUSINESS; ELECTRONIC COMMERCE - E-COMMERCE; E-VENTURE… Mehr…
2008
ISBN: 9783540883128
Kartoniert, 620 Seiten, 235mm x 155mm x 34mm, Sprache(n): eng These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Securit… Mehr…
Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 - gebrauchtes Buch
2008, ISBN: 9783540883128
2008 Neubindung, Buchecken und -kanten leicht angestossen 4774741/12 Versandkostenfreie Lieferung trust,authorization,cluster,privacy,peer-to-peer,identity management,integrity check,secu… Mehr…
2008, ISBN: 9783540883128
*Computer Security - ESORICS 2008* - 13th European Symposium on Research in Computer Security Málaga Spain October 6-8 2008. Proceedings. Auflage 2008 / Taschenbuch für 53.49 € / Aus dem … Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computer Security - ESORICS 2008
EAN (ISBN-13): 9783540883128
ISBN (ISBN-10): 3540883126
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2008
Herausgeber: Springer Berlin Heidelberg
602 Seiten
Gewicht: 0,913 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-03-22T01:13:24+01:00 (Vienna)
Detailseite zuletzt geändert am 2024-02-19T21:02:56+01:00 (Vienna)
ISBN/EAN: 9783540883128
ISBN - alternative Schreibweisen:
3-540-88312-6, 978-3-540-88312-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: lopez
Titel des Buches: european security, eso, malaga, october, research notes, computer computer, european symposium
Daten vom Verlag:
Autor/in: Sushil Jajodia
Titel: Lecture Notes in Computer Science; Security and Cryptology; Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
Verlag: Springer; Springer Berlin
602 Seiten
Erscheinungsjahr: 2008-09-29
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 602 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; anonymity; authorization; cluster; critical attack; firewall; identity; identity management; integrity check; kerberos; peer-to-peer; privacy; protocol analyzer; risk management; security; trust; Cryptology; Theory of Computation; Computer Communication Networks; Hardware Performance and Reliability; e-Commerce and e-Business; IT Operations; Kryptografie, Verschlüsselungstechnologie; Theoretische Informatik; Netzwerk-Hardware; Computerhardware; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; E-Commerce: geschäftliche Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; EA
Session 1: Intrusion Detection and Network Vulnerability Analysis.- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW.- Identifying Critical Attack Assets in Dependency Attack Graphs.- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory.- Session 2: Network Security.- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.- Efficient Handling of Adversary Attacks in Aggregation Applications.- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough.- Session 3: Smart Cards and Identity Management.- Dismantling MIFARE Classic.- A Browser-Based Kerberos Authentication Scheme.- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud.- Session 4: Data and Applications Security.- Disclosure Analysis and Control in Statistical Databases.- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead.- Access Control Friendly Query Verification for Outsourced Data Publishing.- Session 5: Privacy Enhancing Technologies.- Sharemind: A Framework for Fast Privacy-Preserving Computations.- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms.- Remote Integrity Check with Dishonest Storage Server.- Session 6: Anonymity and RFID Privacy.- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks.- RFID Privacy Models Revisited.- A New Formal Proof Model for RFID Location Privacy.- Session 7: Access Control and Trust Negotiation.- Distributed Authorization by Multiparty Trust Negotiation.- Compositional Refinement of Policies in UML – Exemplified for Access Control.- On the Security of Delegation in Access Control Systems.- Session 8: Information Flow and Non-transferability.- Termination-Insensitive Noninterference Leaks More Than Just a Bit.- Security Provisioning in Pervasive Environments Using Multi-objective Optimization.- Improved Security Notions and Protocols for Non-transferable Identification.- Session 9: Secure Electronic Voting and Web Applications Security.- Human Readable Paper Verification of Prêt à Voter.- A Distributed Implementation of the Certified Information Access Service.- Exploring User Reactions to New Browser Cues for Extended Validation Certificates.- A Framework for the Analysis of Mix-Based Steganographic File Systems.- Session 10: VoIP Security, Malware, and DRM.- An Adaptive Policy-Based Approach to SPIT Management.- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.- Eureka: A Framework for Enabling Static Malware Analysis.- New Considerations about the Correct Design of Turbo Fingerprinting Codes.- Session 11: Formal Models and Cryptographic Protocols.- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.- Cryptographic Protocol Explication and End-Point Projection.- State Space Reduction in the Maude-NRL Protocol Analyzer.- Session 12: Language-Based and Hardware Security.- Code-Carrying Authorization.- CPU Bugs, CPU Backdoors and Consequences on Security.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783540883135 Computer Security - ESORICS 2008 (Sushil Jajodia)
- 9783540883135 Computer Security - ESORICS 2008 (Sushil Jajodia)
- 9783540396505 Computer Security - ESORICS 2003 (Dieter Gollmann; Einar Snekkenes)
- 9783319457406 Computer Security ? ESORICS 2016 (Ioannis Askoxylakis; Sotiris Ioannidis; Sokratis Katsikas; Catherine Meadows)
- 9780387562469 Computer Security - ESORICS '92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992 Proceedings (Y. Deswarte)
- 9783540203001 Computer Security - ESORICS 2003 (Gollmann, Dieter, Snekkenes, Einar)
< zum Archiv...