- 5 Ergebnisse
Kleinster Preis: € 71,68, größter Preis: € 118,16, Mittelwert: € 94,36
1
Information Security and Cryptology : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings - Peter Constantin
Bestellen
bei hive.co.uk
£ 66,73
(ca. € 78,81)
Bestellengesponserter Link
Peter Constantin:

Information Security and Cryptology : First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings - neues Buch

2005, ISBN: 9783540324249

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences.It was … Mehr…

No. 9783540324249. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
2
Information Security and Cryptology
Bestellen
bei Orellfuessli.ch
CHF 123,90
(ca. € 118,16)
Versand: € 17,171
Bestellengesponserter Link
Information Security and Cryptology - neues Buch

2005, ISBN: 9783540324249

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was… Mehr…

Nr. A1038252065. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 17.17)
3
Information Security and Cryptology - Dengguo Feng; Dongdai Lin; Moti Yung
Bestellen
bei Springer.com
€ 71,68
Versand: € 0,001
Bestellengesponserter Link
Dengguo Feng; Dongdai Lin; Moti Yung:
Information Security and Cryptology - neues Buch

2005

ISBN: 9783540324249

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00)
4
Information Security and Cryptology - Springer
Bestellen
bei Orellfuessli.ch
CHF 123,90
(ca. € 112,30)
Versand: € 16,311
Bestellengesponserter Link
Springer:
Information Security and Cryptology - neues Buch

2005, ISBN: 9783540324249

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was… Mehr…

Nr. 44258302. Versandkosten:, Sofort per Download lieferbar, zzgl. Versandkosten, Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage. (EUR 16.31)
5
Bestellen
bei lehmanns.de
€ 90,86
Versand: € 0,001
Bestellengesponserter Link
Dengguo Feng; Dongdai Lin; Moti Yung:
Information Security and Cryptology - neues Buch

2005, ISBN: 9783540324249

First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Heidelberg, 2005

Versandkosten:Download sofort lieferbar. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Information Security and Cryptology


EAN (ISBN-13): 9783540324249
Erscheinungsjahr: 2005
Herausgeber: Springer Berlin Heidelberg

Buch in der Datenbank seit 2015-12-21T02:15:17+01:00 (Zurich)
Detailseite zuletzt geändert am 2022-05-19T09:33:08+02:00 (Zurich)
ISBN/EAN: 9783540324249

ISBN - alternative Schreibweisen:
978-3-540-32424-9
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: lin, yun dong
Titel des Buches: information security, china 2005


Daten vom Verlag:

Autor/in: Dengguo Feng; Dongdai Lin; Moti Yung
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Verlag: Springer; Springer Berlin
428 Seiten
Erscheinungsjahr: 2005-12-02
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 428 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; authentication; bluetooth security; cryptanalysis; cryptographic protocols; cryptography; dos attacks; error-correcting code; information; intrusion detection; secure computation; secure proxy; security modeling; signature schemes; systems security; threshold cryptography; algorithm analysis and problem complexity; C; Cryptology; Coding and Information Theory; Computer Communication Networks; Operating Systems; Algorithms; Computers and Society; Computer Science; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Netzwerk-Hardware; Betriebssysteme; Algorithmen und Datenstrukturen; Digital- und Informationstechnologien: soziale und ethische Aspekte; BC

Invited Talks.- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.- You Can Prove So Many Things in Zero-Knowledge.- Identity Based Cryptography.- Improvements on Security Proofs of Some Identity Based Encryption Schemes.- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme.- ID-Based Signature Scheme Without Trusted PKG.- Security Modelling.- Specifying Authentication Using Signal Events in CSP.- Modeling RFID Security.- Systems Security.- Enforcing Email Addresses Privacy Using Tokens.- Efficient Authentication of Electronic Document Workflow.- Signature Schemes.- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.- Efficient Group Signatures from Bilinear Pairing.- Enhanced Aggregate Signatures from Pairings.- Constructing Secure Proxy Cryptosystem.- Symmetric Key Mechanisms.- Towards a General RC4-Like Keystream Generator.- HCTR: A Variable-Input-Length Enciphering Mode.- The kth-Order Quasi-Generalized Bent Functions over Ring Z p .- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences.- Zero-Knowledge and Secure Computations.- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP.- An Improved Secure Two-Party Computation Protocol.- Threshold Cryptography.- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.- ID-Based Threshold Unsigncryption Scheme from Pairings.- Intrusion Detection Systems.- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid FeatureSelection.- Protocol Cryptanalysis.- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.- ECC Algorithms.- A Remark on Implementing the Weil Pairing.- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC.- Applications.- Key Management for Secure Overlay Multicast.- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN.- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault.- Secret Sharing.- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes.- New Methods to Construct Cheating Immune Multisecret Sharing Scheme.- Denial of Service Attacks.- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation.- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks.

< zum Archiv...