- 5 Ergebnisse
Kleinster Preis: € 53,49, größter Preis: € 54,37, Mittelwert: € 53,84
1
Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers - Christoph Niethammer
Bestellen
bei hive.co.uk
£ 46,74
(ca. € 53,68)
Bestellengesponserter Link
Christoph Niethammer:

Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers - neues Buch

2014, ISBN: 9783319159430

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…

No. 9783319159430. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
2
Information Security and Cryptology - ICISC 2014 - Jooyoung Lee; Jongsung Kim
Bestellen
bei Springer.com
€ 53,49
Versand: € 0,001
Bestellengesponserter Link

Jooyoung Lee; Jongsung Kim:

Information Security and Cryptology - ICISC 2014 - neues Buch

2014, ISBN: 9783319159430

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00)
3
Information Security and Cryptology - ICISC 2014 - Jongsung Kim, Jooyoung Lee
Bestellen
bei kobo.com
€ 54,11
Bestellengesponserter Link
Jongsung Kim, Jooyoung Lee:
Information Security and Cryptology - ICISC 2014 - neues Buch

2014

ISBN: 9783319159430

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…

Versandkosten:Zzgl. Versandkosten., zzgl. Versandkosten
4
Information Security and Cryptology - ICISC 2014 - Jooyoung Lee; Jongsung Kim
Bestellen
bei Springer.com
€ 53,54
Bestellengesponserter Link
Jooyoung Lee; Jongsung Kim:
Information Security and Cryptology - ICISC 2014 - neues Buch

2014, ISBN: 9783319159430

Computer Science; Systems and Data Security; Data Encryption; Management of Computing and Information Systems AES, Application Plagiarism, Ciphers, Cryptanalysis, Cryptographic Protocols,… Mehr…

  - Versandkosten:zzgl. Versandkosten.
5
Bestellen
bei hive.co.uk
£ 49,30
(ca. € 54,37)
Bestellengesponserter Link
Anna Esposito:
Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers - neues Buch

2014, ISBN: 9783319159430

; PDF; Computing > Computer security, Springer Berlin Heidelberg

No. 9783319159430. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Information Security and Cryptology - ICISC 2014


EAN (ISBN-13): 9783319159430
Erscheinungsjahr: 3
Herausgeber: Springer

Buch in der Datenbank seit 2015-06-21T05:46:16+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-01-20T11:56:21+01:00 (Zurich)
ISBN/EAN: 9783319159430

ISBN - alternative Schreibweisen:
978-3-319-15943-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: esposito, anna springer, kim
Titel des Buches: information security, seoul


Daten vom Verlag:

Autor/in: Jooyoung Lee; Jongsung Kim
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
Verlag: Springer; Springer International Publishing
448 Seiten
Erscheinungsjahr: 2015-03-16
Cham; CH
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIII, 448 p. 83 illus.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Computersicherheit; Verstehen; AES; Application Plagiarism; Ciphers; Cryptanalysis; Cryptographic Protocols; Data Hiding; Digital Watermarking; Embedded Systems; Fault Analysis; Fingerprint; Formal Methods; Hash Functions; Oblivious Transfer; Phishing; Post-Quantum Cryptography; Provable Security; Public-Key Cryptography; Security Model; Side-Channel Analysis; Social Network Security; C; Data and Information Security; Cryptology; IT Operations; Computer Science; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; BC

General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.- On the Security of Distributed Multiprime RSA.- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme.- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1.- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors.- How Much Can Complexity of Linear Cryptanalysis Be Reduced?.- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.- Bicliques with Minimal Data and Time Complexity for AES.- Fault Analysis on SIMON Family of Lightweight Block Ciphers.- A Clustering Approach for Privacy-Preserving in Social Networks.- Securely Solving Classical Network Flow Problems.- Remote IP Protection Using Timing Channels.- Detecting Camouflaged Applications on Mobile Application Markets.- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.- LSH: A New Fast Secure Hash Function Family.- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern.- Montgomery Modular Multiplication on ARM-NEON Revisited.- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.- Compact and Efficient UC Commitments Under Atomic-Exchanges.- Issuer-Free Adaptive Oblivious Transfer with Access Policy.- Memory Address Side-Channel Analysis on Exponentiation.- Mutant Differential Fault Analysis of Trivium MDFA.
Includes supplementary material: sn.pub/extras

< zum Archiv...