- 5 Resultados
precio mínimo: € 2,78, precio máximo: € 101,64, precio promedio: € 64,32
1
Information Security and Privacy - Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Pedir
por Springer.com
£ 84,99
(aprox. € 97,63)
PedirEnlace patrocinado
Josef Pieprzyk; Hossein Ghodosi; Ed Dawson:

Information Security and Privacy - Pasta blanda

2007, ISBN: 9783540734574

Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and o… Más…

new in stock. Gastos de envío:plus shipping costs., más gastos de envío
2
Information Security and Privacy  12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings  Josef Pieprzyk (u. a.)  Taschenbuch  Pb  Englisch  2007 - Pieprzyk, Josef
Pedir
por booklooker.de
€ 17,90
Envío: € 2,901
PedirEnlace patrocinado

Pieprzyk, Josef:

Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Josef Pieprzyk (u. a.) Taschenbuch Pb Englisch 2007 - Pasta blanda

2007, ISBN: 9783540734574

[ED: Taschenbuch], [PU: Springer Berlin], Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12… Más…

Gastos de envío:Versand nach Deutschland. (EUR 2.90) Buchbär
3
Pedir
por Biblio.co.uk
$ 2,99
(aprox. € 2,78)
Envío: € 5,561
PedirEnlace patrocinado
Pieprzyk, Josef [Editor]; Ghodosi, Hossein [Editor]; Dawson, Ed [Editor];:
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Pasta blanda

2007

ISBN: 9783540734574

Springer, 2007-08-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-08-08, 3

Gastos de envío: EUR 5.56 GuthrieBooks
4
Information Security and Privacy - Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Pedir
por lehmanns.de
€ 101,64
Envío: € 9,951
PedirEnlace patrocinado
Josef Pieprzyk; Hossein Ghodosi; Ed Dawson:
Information Security and Privacy - Pasta blanda

2007, ISBN: 9783540734574

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2007

Gastos de envío:Versand in 10-14 Tagen. (EUR 9.95)
5
Information Security and Privacy - Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Pedir
por lehmanns.de
€ 101,64
Envío: € 9,951
PedirEnlace patrocinado
Josef Pieprzyk; Hossein Ghodosi; Ed Dawson:
Information Security and Privacy - Pasta blanda

2007, ISBN: 9783540734574

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, 2007, Softcover, Buch, [PU: Springer Berlin]

Gastos de envío:sofort lieferbar, , Sans frais d'envoi en Allemagne. (EUR 9.95)

1Dado que algunas plataformas no nos comunican las condiciones de envío y éstas pueden depender del país de entrega, del precio de compra, del peso y tamaño del artículo, de una posible membresía a la plataforma, de una entrega directa por parte de la plataforma o a través de un tercero (Marketplace), etc., es posible que los gastos de envío indicados por eurolibro/terralibro no concuerden con los de la plataforma ofertante.

Datos bibliográficos del mejor libro coincidente

Detalles del libro
Information Security and Privacy

This book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007, held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Detalles del libro - Information Security and Privacy


EAN (ISBN-13): 9783540734574
ISBN (ISBN-10): 3540734570
Tapa dura
Tapa blanda
Año de publicación: 2007
Editorial: Springer Berlin
476 Páginas
Peso: 0,744 kg
Idioma: eng/Englisch

Libro en la base de datos desde 2008-01-09T03:03:59-06:00 (Mexico City)
Página de detalles modificada por última vez el 2024-02-19T14:03:01-06:00 (Mexico City)
ISBN/EAN: 9783540734574

ISBN - escritura alterna:
3-540-73457-0, 978-3-540-73457-4
Mode alterno de escritura y términos de búsqueda relacionados:
Autor del libro: hossein, dawson, josef six, held josef
Título del libro: privacy, information security, australasian science, australia our, computer security


Datos del la editorial

Autor: Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Título: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Editorial: Springer; Springer Berlin
476 Páginas
Año de publicación: 2007-06-15
Berlin; Heidelberg; DE
Idioma: Inglés
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 476 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Signatur; anonymity; authentication; bilinear pairings; biometrics; block ciphers; communication; cryptanalysis; cryptographic attacks; cryptographic hash function; data security; networks; privacy; security; algorithm analysis and problem complexity; Cryptology; IT Operations; Data and Information Security; Computer Communication Networks; Coding and Information Theory; Algorithms; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Informationstheorie; Algorithmen und Datenstrukturen; EA

Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier’s Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- “Sandwich”Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.

< para archivar...