2015, ISBN: 9783540235637
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),… Más…
booklooker.de |
2004, ISBN: 9783540235637
This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), Spain,27 29 October 2004. The ?ve previou… Más…
Orellfuessli.ch Nr. A1000716030. Gastos de envío:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 6 - 9 Werktagen, zzgl. Versandkosten. (EUR 17.60) Details... |
Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings - libro nuevo
2004, ISBN: 3540235639
2004 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaf… Más…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Gastos de envío:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science, 3269, Band 3269) - Pasta blanda
2004, ISBN: 9783540235637
Springer, Taschenbuch, Auflage: 2004, 584 Seiten, Publiziert: 2004-12-16T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: part_3540235639, 3.92 kg, Informationsmanagement, Management, Busi… Más…
amazon.de Krocoworld Gut Gastos de envío:Auf Lager. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
2004, ISBN: 9783540235637
Pasta blanda
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. On the Minimal Assumption… Más…
booklooker.de |
2015, ISBN: 9783540235637
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),… Más…
2004, ISBN: 9783540235637
This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), Spain,27 29 October 2004. The ?ve previou… Más…
Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings - libro nuevo
2004
ISBN: 3540235639
2004 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaf… Más…
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science, 3269, Band 3269) - Pasta blanda
2004, ISBN: 9783540235637
Springer, Taschenbuch, Auflage: 2004, 584 Seiten, Publiziert: 2004-12-16T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: part_3540235639, 3.92 kg, Informationsmanagement, Management, Busi… Más…
2004, ISBN: 9783540235637
Pasta blanda
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. On the Minimal Assumption… Más…
Datos bibliográficos del mejor libro coincidente
Autor: | |
Título: | |
ISBN: |
Detalles del libro - Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science, 3269, Band 3269)
EAN (ISBN-13): 9783540235637
ISBN (ISBN-10): 3540235639
Tapa blanda
Año de publicación: 2004
Editorial: Springer
564 Páginas
Peso: 0,871 kg
Idioma: eng/Englisch
Libro en la base de datos desde 2007-05-25T02:31:31-05:00 (Mexico City)
Página de detalles modificada por última vez el 2023-08-31T06:04:12-06:00 (Mexico City)
ISBN/EAN: 9783540235637
ISBN - escritura alterna:
3-540-23563-9, 978-3-540-23563-7
Mode alterno de escritura y términos de búsqueda relacionados:
Autor del libro: okamoto, qing, lopez, eiji
Título del libro: malaga, october 2004, computer security, information security, notes, conference proceedings communications
Datos del la editorial
Autor: Javier López; Eiji Okamoto
Título: Lecture Notes in Computer Science; Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings
Editorial: Springer; Springer Berlin
572 Páginas
Año de publicación: 2004-10-15
Berlin; Heidelberg; DE
Peso: 1,780 kg
Idioma: Inglés
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
POD
XII, 572 p.
BC; Cryptology; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Kernel; access control; algorithms; calculus; cryptology; data security; database; digital signatures; information security; network security; security; security engineering; systems security; verification; algorithm analysis and problem complexity; Discrete Mathematics in Computer Science; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Cryptology; Discrete Mathematics in Computer Science; Operating Systems; IT Operations; Algorithms; Computer Communication Networks; Kryptografie, Verschlüsselungstechnologie; Mathematik für Informatiker; Diskrete Mathematik; Betriebssysteme; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; Netzwerk-Hardware; EA
On the Minimal Assumptions of Group Signature Schemes.- Perfect Concurrent Signature Schemes.- New Identity-Based Ring Signature Schemes.- On the Security of a Multi-party Certified Email Protocol.- Robust Metering Schemes for General Access Structures.- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks.- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.- Provably Secure Authenticated Tree Based Group Key Agreement.- Taxonomic Consideration to OAEP Variants and Their Security.- Factorization-Based Fail-Stop Signatures Revisited.- A Qualitative Evaluation of Security Patterns.- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.- Volatile Memory Computer Forensics to Detect Kernel Level Compromise.- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.- Hydan: Hiding Information in Program Binaries.- A Semi-fragile Steganographic Digital Signature for Images.- Identification of Traitors Using a Trellis.- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.- Reflector Attack Traceback System with Pushback Based iTrace Mechanism.- Automatic Covert Channel Analysis of a Multilevel Secure Component.- Sound Approximations to Diffie-Hellman Using Rewrite Rules.- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks.- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection.- Threat Analysis on NEtwork MObility (NEMO).- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.- Security Analysis of the Generalized Self-shrinking Generator.- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.- On Some Weak Extensions of AES and BES.- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.- Transient Fault Induction Attacks on XTR.- Adaptive-CCA on OpenPGP Revisited.- A New Key-Insulated Signature Scheme.- Secure Hierarchical Identity Based Signature and Its Application.- Multi-designated Verifiers Signatures.- Dynamic Access Control for Multi-privileged Group Communications.- An Efficient Authentication Scheme Using Recovery Information in Signature.- Time-Scoped Searching of Encrypted Audit Logs.- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.Más, otros libros, que pueden ser muy parecidos a este:
Último libro similar:
9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9780780336766 Proceedings of 1997 International Conference on Information, Communications and Signal Processing: 9-12 September 1997, Singapore (Communications, and Signal Processing (1st : 1997 : Singapore) International Conference on Information)
- 9783540428800 Information and Communications Security: Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceeding (Tatsuaki Okamoto; Jianying Zhou)
- Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Lecture Notes in Computer Science) (2008-06-13) (Dennis Beck, Anasol Peña-Rios, Todd Ogle, Daphne Economou, Markos Mentzelopoulos, Leonel Morgado, Christian Eckhardt, Johanna Pirker, Roxane Koitz-Hristov, Jonathon Richter, Christian Gütl, Michael Gardner)
< para archivar...