2009, ISBN: 9783642014390
Springer, Taschenbuch, Auflage: 2009, 456 Seiten, Publiziert: 2009-04-06T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: biography, 1.4 kg, Management, Business & Karriere, Kategorien, Bü… Mehr…
amazon.de |
2009, ISBN: 9783642014390
Springer, Taschenbuch, Auflage: 2009, 456 Seiten, Publiziert: 2009-04-06T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: biography, 1.4 kg, Management, Business & Karriere, Kategorien, Bü… Mehr…
amazon.de Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
2008, ISBN: 9783642014390
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
Springer.com Nr. 978-3-642-01439-0. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008; revised selected papers. Lecture notes in computer science ; 5487 - Taschenbuch
2009, ISBN: 3642014399
[EAN: 9783642014390], Gebraucht, sehr guter Zustand, [SC: 15.64], [PU: Berlin ; Heidelberg ; New York, NY : Springer], COMPUTERSICHERHEIT ; KONGRESS PEKING, INFORMATIK, XIII, 437 S. : gra… Mehr…
ZVAB.com books4less (Versandantiquariat Petra Gros GmbH & Co. KG), Welling, Germany [1048006] [Rating: 5 (von 5)] NOT NEW BOOK. Versandkosten: EUR 15.64 Details... |
Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008; revised selected papers. Lecture notes in computer science ; 5487 - Taschenbuch
2009, ISBN: 3642014399
[EAN: 9783642014390], Gebraucht, sehr guter Zustand, [PU: Berlin ; Heidelberg ; New York, NY : Springer], COMPUTERSICHERHEIT ; KONGRESS PEKING, INFORMATIK, XIII, 437 S. : graph. Darst. Da… Mehr…
AbeBooks.de books4less (Versandantiquariat Petra Gros GmbH & Co. KG), Welling, Germany [1048006] [Rating: 5 (von 5)] NOT NEW BOOK. Versandkosten: EUR 15.64 Details... |
Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science, Band 5487) - Taschenbuch
2009, ISBN: 9783642014390
Springer, Taschenbuch, Auflage: 2009, 456 Seiten, Publiziert: 2009-04-06T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: biography, 1.4 kg, Management, Business & Karriere, Kategorien, Bü… Mehr…
2009, ISBN: 9783642014390
Springer, Taschenbuch, Auflage: 2009, 456 Seiten, Publiziert: 2009-04-06T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: biography, 1.4 kg, Management, Business & Karriere, Kategorien, Bü… Mehr…
2008
ISBN: 9783642014390
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China… Mehr…
Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008; revised selected papers. Lecture notes in computer science ; 5487 - Taschenbuch
2009, ISBN: 3642014399
[EAN: 9783642014390], Gebraucht, sehr guter Zustand, [SC: 15.64], [PU: Berlin ; Heidelberg ; New York, NY : Springer], COMPUTERSICHERHEIT ; KONGRESS PEKING, INFORMATIK, XIII, 437 S. : gra… Mehr…
Information security and cryptology : 4th international conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008; revised selected papers. Lecture notes in computer science ; 5487 - Taschenbuch
2009, ISBN: 3642014399
[EAN: 9783642014390], Gebraucht, sehr guter Zustand, [PU: Berlin ; Heidelberg ; New York, NY : Springer], COMPUTERSICHERHEIT ; KONGRESS PEKING, INFORMATIK, XIII, 437 S. : graph. Darst. Da… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science, Band 5487)
EAN (ISBN-13): 9783642014390
ISBN (ISBN-10): 3642014399
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2009
Herausgeber: Yung, Moti, Liu, Peng, Lin, Dongdai, Springer
437 Seiten
Gewicht: 0,694 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-01-07T21:31:29+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-03-24T17:37:14+01:00 (Zurich)
ISBN/EAN: 9783642014390
ISBN - alternative Schreibweisen:
3-642-01439-9, 978-3-642-01439-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: lin peng, yun dong, yung, liu
Titel des Buches: beijing 2008, information security, china beijing, beijing von, lecture notes computer science
Daten vom Verlag:
Autor/in: Moti Yung; Peng Liu; Dongdai Lin
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
Verlag: Springer; Springer Berlin
439 Seiten
Erscheinungsjahr: 2009-04-06
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 439 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Public Key; Trusted Computing; anonymity; code; cryptography; data security; identity; information; privacy; security; trust; Cryptology; Coding and Information Theory; Data and Information Security; IT Operations; Computers and Society; Computer Communication Networks; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Computersicherheit; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Netzwerk-Hardware; EA
Invited Talks.- The State of Hash Functions and the NIST SHA-3 Competition.- Key Evolution Systems in Untrusted Update Environments.- Secure and Privacy-Preserving Information Brokering.- Digital Signature and Signcryption Schemes.- Provably Secure Convertible Nominative Signature Scheme.- Cryptanalysis of Two Ring Signcryption Schemes.- Efficient Signcryption Key Encapsulation without Random Oracles.- Privacy and Anonymity.- Strong Anonymous Signatures.- Publicly Verifiable Privacy-Preserving Group Decryption.- Privacy for Private Key in Signatures.- Message Authentication Code and Hash Function.- Security of Truncated MACs.- Security Analysis of Multivariate Polynomials for Hashing.- Secure Protocols.- SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.- Batch ZK Proof and Verification of OR Logic.- Symmetric Cryptography.- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs.- Impossible Differential Analysis of Reduced Round CLEFIA.- Reducible Polynomial over Constructed by Trinomial ??LFSR.- Certificateless Cryptography.- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model.- Further Observations on Certificateless Public Key Encryption.- Hardware Implementation and Side Channel Attack.- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing.- New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA.- Wireless Network Security.- A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN.- Key Predistribution Schemes Using Codes in Wireless Sensor Networks.- Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.- Public Key and Identity Based Cryptography.- On the ComputationalEfficiency of XTR+.- A Variant of Boneh-Gentry-Hamburg’s Pairing-Free Identity Based Encryption Scheme.- Inter-domain Identity-Based Proxy Re-encryption.- Access Control and Network Security.- Hardening Botnet by a Rational Botmaster.- Separation of Duty in Trust-Based Collaboration.- Trusted Computing and Applications.- An Integrity Assurance Mechanism for Run-Time Programs.- A Security and Performance Evaluation of Hash-Based RFID Protocols.- Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030883225 Information Security and Cryptology (Yu Yu; Moti Yung)
- 9783030883225 Information Security and Cryptology (Yu Yu; Moti Yung)
- 9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783319308395 Information Security and Cryptology - ICISC 2015 (Soonhak Kwon; Aaram Yun)
- 9783319121598 Information Security And Cryptology - Icisc 2013 by Hyang-Sook Lee Paperback | Indigo Chapters (Herausgegeben:Lee, Hyang-Sook; Han, Dong-Guk)
- 9783540433194 Information Security and Cryptology - ICISC 2001 (Kwangjo Kim)
< zum Archiv...