Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers - neues Buch
2008, ISBN: 354077534X
2007 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Sans frais d'envoi en Allemagne. (EUR 0.00) Details... |
2007, ISBN: 9783540775348
Information Security Applications ab 92.99 € als Taschenbuch: 8th International Workshop WISA 2007 Jeju Island Korea August 27-29 2007 Revised Selected Papers. Auflage 2007. Aus dem Berei… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) - Taschenbuch
2007, ISBN: 9783540775348
Springer, 2008-02-25. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2008-02-25, 3
Biblio.co.uk |
2007, ISBN: 9783540775348
Information Security Applications ab 92.99 € als Taschenbuch: 8th International Workshop WISA 2007 Jeju Island Korea August 27-29 2007 Revised Selected Papers. Auflage 2007. Aus dem Berei… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
2007, ISBN: 9783540775348
Information Security Applications ab 92.99 € als Taschenbuch: 8th International Workshop WISA 2007 Jeju Island Korea August 27-29 2007 Revised Selected Papers. Auflage 2007. Aus dem Berei… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers - neues Buch
2008, ISBN: 354077534X
2007 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…
2007, ISBN: 9783540775348
Information Security Applications ab 92.99 € als Taschenbuch: 8th International Workshop WISA 2007 Jeju Island Korea August 27-29 2007 Revised Selected Papers. Auflage 2007. Aus dem Berei… Mehr…
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) - Taschenbuch
2007
ISBN: 9783540775348
Springer, 2008-02-25. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2008-02-25, 3
2007, ISBN: 9783540775348
Information Security Applications ab 92.99 € als Taschenbuch: 8th International Workshop WISA 2007 Jeju Island Korea August 27-29 2007 Revised Selected Papers. Auflage 2007. Aus dem Berei… Mehr…
2007, ISBN: 9783540775348
Information Security Applications ab 92.99 € als Taschenbuch: 8th International Workshop WISA 2007 Jeju Island Korea August 27-29 2007 Revised Selected Papers. Auflage 2007. Aus dem Berei… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security Applications
EAN (ISBN-13): 9783540775348
ISBN (ISBN-10): 354077534X
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2008
Herausgeber: Springer Berlin Heidelberg
388 Seiten
Gewicht: 0,602 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-12-13T15:50:57+01:00 (Zurich)
Detailseite zuletzt geändert am 2023-07-04T13:54:23+02:00 (Zurich)
ISBN/EAN: 9783540775348
ISBN - alternative Schreibweisen:
3-540-77534-X, 978-3-540-77534-8
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: kim woo, hyun lee, lee young you, yung
Titel des Buches: 8th, information security applications, whither korea, august
Daten vom Verlag:
Autor/in: Kim Sehun; Moti Yung; Hyung-Woo Lee
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security Applications - 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
Verlag: Springer; Springer Berlin
388 Seiten
Erscheinungsjahr: 2008-01-11
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 388 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Error-correcting Code; Signatur; access control; algorithm; algorithms; anonymity; authentication; biometrics; block ciphers; cryptanalysis; cryptology; data security; privacy; security; algorithm analysis and problem complexity; Cryptology; Data and Information Security; Algorithms; Computer Communication Networks; IT Operations; Special Purpose and Application-Based Systems; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Algorithmen und Datenstrukturen; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; EA
Public Key Crypto Applications.- Universal ? T Pairing Algorithm over Arbitrary Extension Degree.- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.- Secret Signatures: How to Achieve Business Privacy Efficiently?.- Biometrics/Information Hiding.- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.- Geometrically Invariant Image Watermarking in the DWT Domain.- Secure Hardware.- Implementation of LSM-Based RBAC Module for Embedded System.- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.- Secure Systems.- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.- Detecting Motifs in System Call Sequences.- Wireless and Mobile Security.- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.- Breaking 104 Bit WEP in Less Than 60 Seconds.- Efficient Implementation of the Pairing on Mobilephones Using BREW.- Application Security/Secure Systems.- Security Analysis of MISTY1.- A Generic Method for Secure SBox Implementation.- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.- Access Control/DB Security.- Authorization Constraints Specification of RBAC.- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.- A Compositional Multiple Policies Operating System Security Model.- Smart Cards/Secure Systems.- Longer Randomly Blinded RSA KeysMay Be Weaker Than Shorter Ones.- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.- Anonymity and P2P Security.- Risk & Distortion Based K-Anonymity.- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783540775355 Information Security Applications (Hyung-Woo Lee; Kim Sehun; Moti Yung)
- 9783319051482 Information Security Applications (Yongdae Kim; Heejo Lee; Adrian Perrig)
- 9783319150864 Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers: 8909 (Lecture Notes in Computer Science, 8909) (Kyung-Hyune Rhee; Jeong Hyun Yi)
- Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Lecture Notes ... Science Book 8267) (English Edition) (Gao, Wei, Wang, Guilin, Wang, Xueli, Xie (auth.), Dongqing, Lee, Jae Kwang, Yi, Okyeon, Yung (eds.), Moti)
< zum Archiv...