- 5 Ergebnisse
Kleinster Preis: € 86,66, größter Preis: € 96,49, Mittelwert: € 91,96
1
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - Elisa Quintarelli
Bestellen
bei hive.co.uk
£ 76,08
(ca. € 86,66)
Bestellengesponserter Link
Elisa Quintarelli:

Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - neues Buch

2003, ISBN: 9783540245919

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…

No. 9783540245919. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
2
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - Jamie Callan
Bestellen
bei hive.co.uk
£ 80,33
(ca. € 90,46)
Bestellengesponserter Link

Jamie Callan:

Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - neues Buch

2003, ISBN: 9783540245919

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…

No. 9783540245919. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
3
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - Holger Karl
Bestellen
bei hive.co.uk
£ 80,33
(ca. € 91,32)
Bestellengesponserter Link
Holger Karl:
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - neues Buch

2003

ISBN: 9783540245919

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…

No. 9783540245919. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
4
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - David Hales
Bestellen
bei hive.co.uk
£ 80,33
(ca. € 94,87)
Bestellengesponserter Link
David Hales:
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - neues Buch

2003, ISBN: 9783540245919

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…

No. 9783540245919. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
5
Information Security Applications
Bestellen
bei eBook.de
€ 96,49
Versand: € 0,001
Bestellengesponserter Link
Information Security Applications - neues Buch

2003, ISBN: 9783540245919

Information Security Applications - 4th International Workshop WISA 2003 Jeju Island Korea August 25-27 2003 Revised Papers: ab 96.49 € eBooks > Sachthemen & Ratgeber > Computer & Interne… Mehr…

Versandkosten:in stock, , , DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Information Security Applications


EAN (ISBN-13): 9783540245919
Erscheinungsjahr: 2003
Herausgeber: Springer Berlin Heidelberg

Buch in der Datenbank seit 2017-05-10T03:02:06+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-07-20T11:51:50+02:00 (Zurich)
ISBN/EAN: 9783540245919

ISBN - alternative Schreibweisen:
978-3-540-24591-9


Daten vom Verlag:

Autor/in: Kijoon Chae; Moti Yung
Titel: Lecture Notes in Computer Science; Information Security Applications - 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers
Verlag: Springer; Springer Berlin
512 Seiten
Erscheinungsjahr: 2003-12-22
Berlin; Heidelberg; DE
Sprache: Englisch
96,29 € (DE)
99,00 € (AT)
118,00 CHF (CH)
Available
XII, 512 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Information; Public Key; Signatur; architecture; data security; digital rights management; e-commerce security; information security; intrusion detection; mobile security; model checking; network security; security applications; systems security; verification; algorithm analysis and problem complexity; C; Cryptology; Computer Communication Networks; Special Purpose and Application-Based Systems; Operating Systems; Algorithms; IT Operations; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Wissensbasierte Systeme, Expertensysteme; Betriebssysteme; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; BC

Network Security.- Model Checking of Security Protocols with Pre-configuration.- Remote Access VPN with Port Protection Function by Mobile Codes.- A Role of DEVS Simulation for Information Assurance.- Mobile Security.- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.- Reliable Cascaded Delegation Scheme for Mobile Agent Environments.- Practical Solution for Location Privacy in Mobile IPv6.- Intrusion Detection.- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection.- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System.- Towards a Global Security Architecture for Intrusion Detection and Reaction Management.- Internet Security.- Intrusion-Tolerant System Design for Web Server Survivability.- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access.- An Automatic Security Evaluation System for IPv6 Network.- Secure Software, Hardware, and Systems I.- A Location Privacy Protection Mechanism for Smart Space.- Secure System Architecture Based on Dynamic Resource Reallocation.- Fair Exchange with Guardian Angels.- Secure Software, Hardware, and Systems II.- Sign-Based Differential Power Analysis.- Asymmetric Watermarking Scheme Using Permutation Braids.- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ).- E-commerce Security.- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.- Multi-dimensional Hash Chain For Sealed-Bid Auction.- An Improved Forward Integrity Protocol for Mobile Agents.- Digital Rights Management.- Taming “Trusted Platforms” by Operating System Design.- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.- Reducing Storage at Receivers in SD and LSD Broadcast EncryptionSchemes.- Biometrics and Human Interfaces I.- 3D Face Recognition under Pose Varying Environments.- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint.- Fingerprint-Based Authentication for USB Token Systems.- Biometrics and Human Interfaces II.- Iris Recognition System Using Wavelet Packet and Support Vector Machines.- Biometrics Identification and Verification Using Projection-Based Face Recognition System.- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification.- Public Key Cryptography / Key Management.- E-MHT. An Efficient Protocol for Certificate Status Checking.- A Comment on Group Independent Threshold Sharing.- Automation-Considered Logic of Authentication and Key Distribution.- Applied Cryptography.- The MESH Block Ciphers.- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.
Includes supplementary material: sn.pub/extras

< zum Archiv...