Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers 2010 - gebrauchtes Buch
2010, ISBN: 9783642108372
2010 Neubindung 6247903/12 Versandkostenfreie Lieferung Broadcast,calculus,access control,secret sharing,network security,algorithm analysis and problem complexity,cryptography,Proxy,cryp… Mehr…
buchfreund.de |
2010, ISBN: 9783642108372
*Information Security Applications* - 10th International Workshop WISA 2009 Busan Korea August 25-27 2009 Revised Selected Papers. Auflage 2010 / Taschenbuch für 53.49 € / Aus dem Bereich… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
2010, ISBN: 9783642108372
Information Security Applications ab 85.49 € als Taschenbuch: 10th International Workshop WISA 2009 Busan Korea August 25-27 2009 Revised Selected Papers. Auflage 2010. Aus dem Bereich: B… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers - gebrauchtes Buch
2010, ISBN: 9783642108372
[PU: Springer Berlin], Neubindung 6247903/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2010, PayPal, Internationaler Versand
booklooker.de |
2010, ISBN: 9783642108372
Taschenbuch
10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers, Buch, Softcover, 2010, [PU: Springer Berlin], Springer Berlin, 2010
lehmanns.de Versandkosten:Kein Versand in Ihr Zielland., zzgl. Versandkosten Details... |
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers 2010 - gebrauchtes Buch
2010, ISBN: 9783642108372
2010 Neubindung 6247903/12 Versandkostenfreie Lieferung Broadcast,calculus,access control,secret sharing,network security,algorithm analysis and problem complexity,cryptography,Proxy,cryp… Mehr…
2010, ISBN: 9783642108372
*Information Security Applications* - 10th International Workshop WISA 2009 Busan Korea August 25-27 2009 Revised Selected Papers. Auflage 2010 / Taschenbuch für 53.49 € / Aus dem Bereich… Mehr…
2010
ISBN: 9783642108372
Information Security Applications ab 85.49 € als Taschenbuch: 10th International Workshop WISA 2009 Busan Korea August 25-27 2009 Revised Selected Papers. Auflage 2010. Aus dem Bereich: B… Mehr…
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers - gebrauchtes Buch
2010, ISBN: 9783642108372
[PU: Springer Berlin], Neubindung 6247903/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2010, PayPal, Internationaler Versand
2010, ISBN: 9783642108372
Taschenbuch
10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers, Buch, Softcover, 2010, [PU: Springer Berlin], Springer Berlin, 2010
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security Applications
EAN (ISBN-13): 9783642108372
ISBN (ISBN-10): 3642108377
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2010
Herausgeber: Springer Berlin Heidelberg
386 Seiten
Gewicht: 0,600 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2009-11-28T21:03:54+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-02-22T18:55:13+01:00 (Zurich)
ISBN/EAN: 9783642108372
ISBN - alternative Schreibweisen:
3-642-10837-7, 978-3-642-10837-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: gerd heun, yung
Titel des Buches: information security, security 2009, sel, busan korea, whither korea, august, lecture notes computer science, englisch international
Daten vom Verlag:
Autor/in: Heung Youl Youm; Moti Yung
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security Applications - 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
Verlag: Springer; Springer Berlin
386 Seiten
Erscheinungsjahr: 2010-01-08
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 386 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Broadcast; Proxy; access control; anonymity; authentication; calculus; cryptoanalysis; cryptographic protocol; cryptography; information security; logic; network security; privacy; secret sharing; security; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Discrete Mathematics in Computer Science; Data and Information Security; Algorithms; Mathematical Applications in Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Mathematik für Informatiker; Diskrete Mathematik; Computersicherheit; Netzwerksicherheit; Algorithmen und Datenstrukturen; Theoretische Informatik; EA
Multimedia Security.- Protecting IPTV Service Network against Malicious Rendezvous Point.- Design and Implementation of SIP-aware Security Management System.- Device Security.- Application Management Framework in User Centric Smart Card Ownership Model.- When Compromised Readers Meet RFID.- HW Implementation Security.- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?.- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.- Applied Cryptography.- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.- ID-Based Adaptive Oblivious Transfer.- Side Channel Attacks.- Unknown Plaintext Template Attacks.- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation.- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.- Cryptograptanalysis.- Finding Collisions for a 45-Step Simplified HAS-V.- Non-linear Error Detection for Finite State Machines.- Quadratic Equations from a Kind of S-boxes.- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.- Anonymity/Authentication/Access Control.- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET.- A Selectable k-Times Relaxed Anonymous Authentication Scheme.- PUF-Based Authentication Protocols – Revisited.- Mediated Ciphertext-Policy Attribute-Based Encryption andIts Application.- Network Security.- Securing Remote Access Inside Wireless Mesh Networks.- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers.- USN Middleware Security Model.- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319150864 Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers: 8909 (Lecture Notes in Computer Science, 8909) (Kyung-Hyune Rhee; Jeong Hyun Yi)
- 9783319051482 Information Security Applications (Yongdae Kim; Heejo Lee; Adrian Perrig)
- 9783642108389 Information Security Applications (Heung Youl Youm; Moti Young)
- Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Lecture Notes ... Science Book 8267) (English Edition) (Gao, Wei, Wang, Guilin, Wang, Xueli, Xie (auth.), Dongqing, Lee, Jae Kwang, Yi, Okyeon, Yung (eds.), Moti)
< zum Archiv...