Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008 - gebrauchtes Buch
2008, ISBN: 9783540794981
2008 Neubindung, Buchrücken, -ecken u. -kanten leicht angestossen 4355978/12 Versandkostenfreie Lieferung information,trust,algorithm analysis and problem complexity,Trusted Computing,sec… Mehr…
buchfreund.de |
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ... Computer Science / Security and Cryptology) - Taschenbuch
2007, ISBN: 9783540794981
Springer, 2008-08-27. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2008-08-27, 3
Biblio.co.uk |
2008, ISBN: 9783540794981
*Information Security and Cryptology* - Third SKLOIS Conference Inscrypt 2007 Xining China August 31 - September 5 2007 Revised Selected Papers. Auflage 2008 / Taschenbuch für 53.49 € / A… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers - gebrauchtes Buch
2008, ISBN: 9783540794981
[PU: Springer Berlin], Neubindung, Buchrücken, -ecken u. -kanten leicht angestossen 4355978/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2008, PayPal, Internationaler Ve… Mehr…
booklooker.de |
2008, ISBN: 3540794980
Information Security and Cryptology ab 106.99 € als Taschenbuch: Third SKLOIS Conference Inscrypt 2007 Xining China August 31 - September 5 2007 Revised Selected Papers. Auflage 2008. Aus… Mehr…
Hugendubel.de Nr. 7357459. Versandkosten:, , DE. (EUR 0.00) Details... |
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008 - gebrauchtes Buch
2008, ISBN: 9783540794981
2008 Neubindung, Buchrücken, -ecken u. -kanten leicht angestossen 4355978/12 Versandkostenfreie Lieferung information,trust,algorithm analysis and problem complexity,Trusted Computing,sec… Mehr…
Pei, Dingyi [Editor]; Yung, Moti [Editor]; Lin, Dongdai [Editor]; Wu, Chuankun [Editor];:
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers ... Computer Science / Security and Cryptology) - Taschenbuch2007, ISBN: 9783540794981
Springer, 2008-08-27. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2008-08-27, 3
2008
ISBN: 9783540794981
*Information Security and Cryptology* - Third SKLOIS Conference Inscrypt 2007 Xining China August 31 - September 5 2007 Revised Selected Papers. Auflage 2008 / Taschenbuch für 53.49 € / A… Mehr…
Information Security and Cryptology Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers - gebrauchtes Buch
2008, ISBN: 9783540794981
[PU: Springer Berlin], Neubindung, Buchrücken, -ecken u. -kanten leicht angestossen 4355978/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2008, PayPal, Internationaler Ve… Mehr…
2008, ISBN: 3540794980
Information Security and Cryptology ab 106.99 € als Taschenbuch: Third SKLOIS Conference Inscrypt 2007 Xining China August 31 - September 5 2007 Revised Selected Papers. Auflage 2008. Aus… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Cryptology
EAN (ISBN-13): 9783540794981
ISBN (ISBN-10): 3540794980
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2008
Herausgeber: Springer Berlin Heidelberg
534 Seiten
Gewicht: 0,814 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-08-05T16:39:21+02:00 (Zurich)
Detailseite zuletzt geändert am 2024-02-19T21:03:01+01:00 (Zurich)
ISBN/EAN: 9783540794981
ISBN - alternative Schreibweisen:
3-540-79498-0, 978-3-540-79498-1
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: kurt marti, pei, yun dong
Titel des Buches: information security, info, from one china the other, august, computer security
Daten vom Verlag:
Autor/in: Dingyi Pei; Moti Yung; Dongdai Lin; Chuankun Wu
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Verlag: Springer; Springer Berlin
534 Seiten
Erscheinungsjahr: 2008-07-18
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 534 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Informatik; Boolean function; Public Key; Trusted Computing; data security; information; privacy; security; trust; algorithm analysis and problem complexity; Data and Information Security; Cryptology; IT Operations; Computers and Society; Computer Communication Networks; Algorithms; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Netzwerk-Hardware; Algorithmen und Datenstrukturen; EA
Invited Talks.- Cryptanalysis of the SFLASH Signature Scheme.- On the Evolution of User Authentication: Non-bilateral Factors.- Digital Signature Schemes.- ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.- Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.- An Efficient ID-Based Proxy Signature Scheme from Pairings.- Block Cipher.- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent.- Linear Slide Attacks on the KeeLoq Block Cipher.- Key Management.- A Key Predistribution Scheme Based on 3-Designs.- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.- A Provably Secure One-Pass Two-Party Key Establishment Protocol.- Zero Knowledge and Secure Computation Protocols.- Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption.- Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries.- A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.- Secret Sharing.- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.- Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks.- Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images.- Stream Cipher and Pseudorandomness.- Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks.- Four Families of Binary Sequences with Low Correlation and Large Linear Complexity.- Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves.- Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators.- Boolean Functions.- Linear Equation on PolynomialSingle Cycle T-Functions.- Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables.- Privacy and Deniability.- Anonymity and k-Choice Identities.- Deniable Authentication on the Internet.- Orthogonality between Key Privacy and Data Privacy, Revisited.- Unlinkable Randomizable Signature and Its Application in Group Signature.- Hash Functions.- An Improved Collision Attack on MD5 Algorithm.- Multivariates Polynomials for Hashing.- Public Key Cryptosystems.- Efficient Public Key Encryption with Keyword Search Schemes from Pairings.- Multi-Identity Single-Key Decryption without Random Oracles.- Public Key Analysis.- Kipnis-Shamir Attack on HFE Revisited.- Cryptanalysis of General Lu-Lee Type Systems.- A Timing-Resistant Elliptic Curve Backdoor in RSA.- Application Security.- A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol.- Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.- Systems Security and Trusted Computing.- Building Trusted Sub-domain for the Grid with Trusted Computing.- Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.- Online Tracing Scanning Worm with Sliding Window.- Network Security.- A New Proactive Defense Model Based on Intrusion Deception and Traceback.- On Modeling Post Decryption Error Processes in UMTS Air Interface.- A Simple, Smart and Extensible Framework for Network Security Measurement.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783319308395 Information Security and Cryptology - ICISC 2015 (Soonhak Kwon; Aaram Yun)
- 9783319121598 Information Security And Cryptology - Icisc 2013 by Hyang-Sook Lee Paperback | Indigo Chapters (Herausgegeben:Lee, Hyang-Sook; Han, Dong-Guk)
< zum Archiv...