2007, ISBN: 9783540734574
Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and o… Más…
Springer.com new in stock. Gastos de envío:plus shipping costs., más gastos de envío Details... |
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Josef Pieprzyk (u. a.) Taschenbuch Pb Englisch 2007 - Pasta blanda
2007, ISBN: 9783540734574
[ED: Taschenbuch], [PU: Springer Berlin], Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12… Más…
booklooker.de |
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Pasta blanda
2007, ISBN: 9783540734574
Springer, 2007-08-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-08-08, 3
Biblio.co.uk |
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2007
lehmanns.de Gastos de envío:Versand in 10-14 Tagen. (EUR 9.95) Details... |
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, 2007, Softcover, Buch, [PU: Springer Berlin]
lehmanns.de Gastos de envío:sofort lieferbar, , Sans frais d'envoi en Allemagne. (EUR 9.95) Details... |
2007, ISBN: 9783540734574
Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and o… Más…
Pieprzyk, Josef:
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Josef Pieprzyk (u. a.) Taschenbuch Pb Englisch 2007 - Pasta blanda2007, ISBN: 9783540734574
[ED: Taschenbuch], [PU: Springer Berlin], Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12… Más…
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Pasta blanda
2007
ISBN: 9783540734574
Springer, 2007-08-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-08-08, 3
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2007
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, 2007, Softcover, Buch, [PU: Springer Berlin]
Datos bibliográficos del mejor libro coincidente
Autor: | |
Título: | |
ISBN: |
Detalles del libro - Information Security and Privacy
EAN (ISBN-13): 9783540734574
ISBN (ISBN-10): 3540734570
Tapa dura
Tapa blanda
Año de publicación: 2007
Editorial: Springer Berlin
476 Páginas
Peso: 0,744 kg
Idioma: eng/Englisch
Libro en la base de datos desde 2008-01-09T03:03:59-06:00 (Mexico City)
Página de detalles modificada por última vez el 2024-02-19T14:03:01-06:00 (Mexico City)
ISBN/EAN: 9783540734574
ISBN - escritura alterna:
3-540-73457-0, 978-3-540-73457-4
Mode alterno de escritura y términos de búsqueda relacionados:
Autor del libro: hossein, dawson, josef six, held josef
Título del libro: privacy, information security, australasian science, australia our, computer security
Datos del la editorial
Autor: Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Título: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Editorial: Springer; Springer Berlin
476 Páginas
Año de publicación: 2007-06-15
Berlin; Heidelberg; DE
Idioma: Inglés
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 476 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Signatur; anonymity; authentication; bilinear pairings; biometrics; block ciphers; communication; cryptanalysis; cryptographic attacks; cryptographic hash function; data security; networks; privacy; security; algorithm analysis and problem complexity; Cryptology; IT Operations; Data and Information Security; Computer Communication Networks; Coding and Information Theory; Algorithms; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Informationstheorie; Algorithmen und Datenstrukturen; EA
Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier’s Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- “Sandwich”Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.Más, otros libros, que pueden ser muy parecidos a este:
Último libro similar:
9783030215477 Information Security and Privacy (Julian Jang-Jaccard; Fuchun Guo)
- 9783030215477 Information Security and Privacy (Julian Jang-Jaccard; Fuchun Guo)
- 9783030215484 Information Security and Privacy (Fuchun Guo; Julian Jang-Jaccard)
- 9780314801111 Information Security and Privacy: A Guide to Federal and State Law and Compliance, 2013 ed.. (Andrew Serwin)
- 9780314603128 Information Security and Privacy: A Guide to Federal and State Law and Compliance (Andrew B. Serwin)
- 9780314610768 Information Security and Privacy 2013: A Guide to Federal and State Law and Compliance (Andrew B. Serwin)
< para archivar...