ISBN: 9783540497844
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 rev… Mehr…
Springer.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
ISBN: 9783540497844
Computer Science; Data Encryption; Operating Systems; Management of Computing and Information Systems; Computer Communication Networks DVD, DVD-Video, RSA, Session, Smart Card, code, comm… Mehr…
Springer.com Versandkosten: EUR 0.00 Details... |
ISBN: 9783540497844
Computer Science; Data Encryption; Operating Systems; Management of Computing and Information Systems; Computer Communication Networks DVD, DVD-Video, RSA, Session, Smart Card, code, comm… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
ISBN: 9783540497844
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 rev… Mehr…
Jean-Jacques Quisquater; Yves Deswarte; Catherine Meadows; Dieter Gollmann:
Computer Security - ESORICS 98 - neues BuchISBN: 9783540497844
Computer Science; Data Encryption; Operating Systems; Management of Computing and Information Systems; Computer Communication Networks DVD, DVD-Video, RSA, Session, Smart Card, code, comm… Mehr…
ISBN: 9783540497844
Computer Science; Data Encryption; Operating Systems; Management of Computing and Information Systems; Computer Communication Networks DVD, DVD-Video, RSA, Session, Smart Card, code, comm… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computer Security - ESORICS 98
EAN (ISBN-13): 9783540497844
Herausgeber: Springer Science+Business Media
Buch in der Datenbank seit 2016-11-28T19:44:04+01:00 (Zurich)
Detailseite zuletzt geändert am 2021-10-17T13:59:50+02:00 (Zurich)
ISBN/EAN: 9783540497844
ISBN - alternative Schreibweisen:
978-3-540-49784-4
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: meadows, göllmann, gollmann
Daten vom Verlag:
Autor/in: Jean-Jacques Quisquater; Yves Deswarte; Catherine Meadows; Dieter Gollmann
Titel: Lecture Notes in Computer Science; Computer Security - ESORICS 98 - 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Verlag: Springer; Springer Berlin
382 Seiten
Erscheinungsjahr: 2005-01-14
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
X, 382 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; DVD; DVD-Video; RSA; Session; Smart Card; code; communication; computer security; distributed systems; information; kernel; security; C; Cryptology; Operating Systems; IT Operations; Computer Communication Networks; Computer Science; Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; BC
Fixed vs. variable-length patterns for detecting suspicious process behavior.- A tool for pro-active defense against the buffer overrun attack.- A kernelized architecture for multilevel secure application policies.- Dealing with multi-policy security in large open distributed systems.- A flexible method for information system security policy specification.- On the security of some variants of the RSA signature scheme.- Side channel cryptanalysis of product ciphers.- On the security of digital tachographs.- An authorization model and its formal semantics.- Authorization in CORBA security.- Rules for designing multilevel Object-Oriented Databases.- Byte code verification for Java smart cards based on model checking.- Towards formalizing the Java security architecture of JDK 1.2.- EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets.- MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video.- DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system.- The “ticket” concept for copy control based on embedded signalling.- Panel session: Watermarking.- Authentication and payment in future mobile systems.- Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks.- A mix-mediated anonymity service and its payment.- A subjective metric of authentication.- A sound logic for analysing electronic commerce protocols.- Kerberos Version IV: Inductive analysis of the secrecy goals.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319112121 Computer Security - ESORICS 2014 (Pedro Ponce-Cruz)
- 9783319112121 Computer Security - ESORICS 2014 (Pedro Ponce-Cruz)
- 9783319112039 Computer Security - ESORICS 2014 (Miroslaw Kutylowski; Jaideep Vaidya)
- 9783319112114 Computer Security - ESORICS 2014 (Miroslaw Kutylowski; Jaideep Vaidya)
- 9783319112022 Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. (Miroslaw Kutylowski; Jaideep Vaidya)
- 9783540650041 Computer Security - ESORICS 98 (Jean-Jacques Quisquater/ Yves Deswarte/ Catherine Meadows)
< zum Archiv...