- 5 Ergebnisse
Kleinster Preis: € 91,90, größter Preis: € 117,05, Mittelwert: € 101,07
1
Network and System Security  7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings  Ravi Sandhu  Taschenbuch  Paperback  Englisch  2013 - Sandhu, Ravi
Bestellen
bei booklooker.de
€ 91,90
Versand: € 0,001
Bestellengesponserter Link
Sandhu, Ravi:

Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings Ravi Sandhu Taschenbuch Paperback Englisch 2013 - Taschenbuch

2013, ISBN: 9783642386305

[ED: Taschenbuch], [PU: Springer Berlin], This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in Jun… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) preigu
2
Network and System Security  7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings  Ravi Sandhu  Taschenbuch  Paperback  Englisch  2013 - Sandhu, Ravi
Bestellen
bei booklooker.de
€ 93,90
Versand: € 0,001
Bestellengesponserter Link

Sandhu, Ravi:

Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings Ravi Sandhu Taschenbuch Paperback Englisch 2013 - Taschenbuch

2013, ISBN: 9783642386305

[ED: Taschenbuch], [PU: Springer Berlin], This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in Jun… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchbär
3
Network and System Security - Javier Lopez
Bestellen
bei booklooker.de
€ 117,05
Versand: € 0,001
Bestellengesponserter Link
Javier Lopez:
Network and System Security - Taschenbuch

2017

ISBN: 9783642386305

[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in … Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchhandlung - Bides GbR
4
Network and System Security - Javier Lopez
Bestellen
bei booklooker.de
€ 100,83
Versand: € 0,001
Bestellengesponserter Link
Javier Lopez:
Network and System Security - Taschenbuch

2017, ISBN: 9783642386305

[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in … Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) buchversandmimpf2000
5
Network and System Security - Javier Lopez; Xinyi Huang; Ravi Sandhu
Bestellen
bei lehmanns.de
€ 101,65
Versand: € 0,001
Bestellengesponserter Link
Javier Lopez; Xinyi Huang; Ravi Sandhu:
Network and System Security - Taschenbuch

2013, ISBN: 9783642386305

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2013

Versandkosten:sofort lieferbar. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Network and System Security


EAN (ISBN-13): 9783642386305
ISBN (ISBN-10): 364238630X
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2013
Herausgeber: Springer Berlin

Buch in der Datenbank seit 2014-03-10T17:38:54+01:00 (Zurich)
Detailseite zuletzt geändert am 2023-02-21T01:59:01+01:00 (Zurich)
ISBN/EAN: 9783642386305

ISBN - alternative Schreibweisen:
3-642-38630-X, 978-3-642-38630-5
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: huang, xin, lopez
Titel des Buches: network security, spain madrid, drei


Daten vom Verlag:

Autor/in: Javier Lopez; Xinyi Huang; Ravi Sandhu
Titel: Security and Cryptology; Lecture Notes in Computer Science; Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings
Verlag: Springer; Springer Berlin
793 Seiten
Erscheinungsjahr: 2013-05-17
Berlin; Heidelberg; DE
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XX, 793 p. 207 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Informatik; RFID; attribute-based signature; computer networks; encryption; vehicular ad-hoc networks; Data and Information Security; Computer Communication Networks; Cryptology; IT Operations; e-Commerce and e-Business; Netzwerksicherheit; Netzwerk-Hardware; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; E-Commerce: geschäftliche Aspekte; EA

Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study.- A Technology Independent Security Gateway for Real-Time Multimedia Communication.- Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection.- Model the Influence of Sybil Nodes in P2P Botnets.- Network Security: Security Protocols and Practice A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture.- The OffPAD: Requirements and Usage.- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.- Using Trusted Platform Modules for Location Assurance in Cloud Networking.- Network Security: Network Attacks and Defense Tracing Sources of Anonymous Slow Suspicious Activities.- Static Analysis for Regular Expression Denial-of-Service Attacks.- Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding.- Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning.- System Security: Malware and Intrusions MADS: Malicious Android Applications Detection through String Analysis.- X-TIER: Kernel Module Injection.- Leveraging String Kernels for Malware Detection.- Insiders Trapped in the Mirror Reveal Themselves in Social Media.- System Security: Applications Security On Business Logic Vulnerabilities Hunting: The APP LogGIC Framework.- Using the Smart Card Web Server in Secure Branchless Banking.- Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.- Efficient and Private Three-Party Publish/Subscribe.- System Security: Security Algorithms and Systems Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.- Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.- Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines.- JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms.- Forward Secure Certificateless Proxy Signature Scheme.- Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.- On the Security of an Efficient Attribute-Based Signature.- Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method.- Performance Prediction Model for Block Ciphers on GPU Architectures.- Threshold-Oriented Optimistic Fair Exchange.- Secure Storage and Fuzzy Query over Encrypted Databases.- A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.- Privacy Preserving Context Aware Publish Subscribe Systems.- A New Unpredictability-Based RFID Privacy Model.- Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.- Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.- Key Agreement and Distribution Light Weight Network Coding Based Key Distribution Scheme for MANETs.- Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.- Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.- An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks.- Human Identification with Electroencephalogram (EEG) for the Future Network Security.- Building Better Unsupervised Anomaly Detector with S-Transform.- Fault-Tolerant Topology Control Based on Artificial Immune in WMNs.- Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens.- On the Use of Key Assignment Schemes in Authentication Protocols.- On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems.- Security Authentication of AODV Protocols in MANETs.- Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.- Towards a Privacy-Preserving Solution for OSNs.- Measuring and Comparing the Protection Quality in Different Operating Systems.- Collusion-Resistant Domain-Specific Pseudonymous Signatures.- On the Applicability of Time-Driven Cache Attacks on Mobile Devices.- Ancestor Excludable Hierarchical ID-Based Encryption Revisited.- Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks.- A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.- Distributed and Anonymous Publish-Subscribe.- Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs.- Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments.- Filtering Trolling Comments through Collective Classification.- Security Analysis of Touch Inputted Passwords: A Preliminary Study Based on the Resistance against Brute Force Attacks.- A Pairing-Free Identity Based Authentication Framework for Cloud Computing.- Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.- Towards a More Secure Apache Hadoop HDFS Infrastructure: Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures.- A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR.- A Comprehensive Access Control System for Scientific Applications.- Partial Fingerprint Reconstruction with Improved Smooth Extension.- Modeling and Analysis for Thwarting Worm Propagation in Email Networks.- On Secure and Power-Efficient RFID-Based Wireless Body Area Network.- Towards Authenticated Objects.- A Finger-Vein Based Cancellable Bio-cryptosystem.
Conference proceedings of the International Conference on Network and System Security

Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:

Neuestes ähnliches Buch:
2900124166898 Network and System Security (John R. Vacca)


< zum Archiv...