2004, ISBN: 9783540318156
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
Springer.com new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00) Details... |
2004, ISBN: 9783540318156
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
Springer.com Nr. 978-3-540-31815-6. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
2004, ISBN: 9783540318156
Information Security Applications ab 96.49 € als pdf eBook: 5th International Workshop WISA 2004 Jeju Island Korea August 23-25 2004 Revised Selected Papers. Aus dem Bereich: eBooks, Sach… Mehr…
Hugendubel.de Nr. 25414166. Versandkosten:, , plus shipping costs. (EUR 7.50) Details... |
2004, ISBN: 9783540318156
Information Security Applications - 5th International Workshop WISA 2004 Jeju Island Korea August 23-25 2004 Revised Selected Papers: ab 96.49 € eBooks > Sachthemen & Ratgeber > Computer … Mehr…
eBook.de Versandkosten:in stock, , , plus shipping costs., zzgl. Versandkosten Details... |
2005, ISBN: 9783540318156
5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Hei… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2004, ISBN: 9783540318156
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
2004, ISBN: 9783540318156
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
2004
ISBN: 9783540318156
Information Security Applications ab 96.49 € als pdf eBook: 5th International Workshop WISA 2004 Jeju Island Korea August 23-25 2004 Revised Selected Papers. Aus dem Bereich: eBooks, Sach… Mehr…
2004, ISBN: 9783540318156
Information Security Applications - 5th International Workshop WISA 2004 Jeju Island Korea August 23-25 2004 Revised Selected Papers: ab 96.49 € eBooks > Sachthemen & Ratgeber > Computer … Mehr…
2005, ISBN: 9783540318156
5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, eBooks, eBook Download (PDF), [PU: Springer Berlin Heidelberg], Springer Berlin Hei… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security Applications
EAN (ISBN-13): 9783540318156
Erscheinungsjahr: 2004
Herausgeber: Springer Berlin Heidelberg
Buch in der Datenbank seit 2016-03-13T04:18:39+01:00 (Zurich)
Detailseite zuletzt geändert am 2023-12-02T14:53:14+01:00 (Zurich)
ISBN/EAN: 9783540318156
ISBN - alternative Schreibweisen:
978-3-540-31815-6
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: lim, flügge, siegfried springer
Titel des Buches: information security
Daten vom Verlag:
Autor/in: Chae Hoon Lim; Moti Yung
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security Applications - 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Verlag: Springer; Springer Berlin
474 Seiten
Erscheinungsjahr: 2005-02-10
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 474 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Information; Linux; Smart Card; applied cryptography; communication; computer security; cryptographic attacks; data security; information security; intrusion detection; privacy; public key cryptography; secure networking; security; systems security; algorithm analysis and problem complexity; C; Cryptology; Operating Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Management of Computing and Information Systems; Special Purpose and Application-Based Systems; Cryptology; Operating Systems; Algorithms; Computer Communication Networks; IT Operations; Special Purpose and Application-Based Systems; Computer Science; Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Algorithmen und Datenstrukturen; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; BC
Network/Computer Security.- Impacts of Security Protocols on Real-Time Multimedia Communications.- An Improvement on Privacy and Authentication in GSM.- Encrypted Watermarks and Linux Laptop Security.- Inconsistency Detection of Authorization Policies in Distributed Component Environment.- Public Key Schemes I.- Custodian-Hiding Verifiable Encryption.- Proving Key Usage.- Public Key Encryption with Conjunctive Field Keyword Search.- Intrusion Detection I.- A Probabilistic Method for Detecting Anomalous Program Behavior.- Service Discrimination and Audit File Reduction for Effective Intrusion Detection.- IDS False Alarm Filtering Using KNN Classifier.- Watermarking/Anti-spamming.- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking.- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.- Public Key Schemes II.- Efficient Authenticated Key Agreement Protocol for Dynamic Groups.- A Ring Signature Scheme Using Bilinear Pairings.- Verifiable Pairing and Its Applications.- Intrusion Detection II.- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading.- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks.- Application of Content Computing in Honeyfarm.- Digital Rights Management.- License Protection with a Tamper-Resistant Token.- An Adaptive Approach to Hardware Alteration for Digital Rights Management.- Dynamic Fingerprinting over Broadcast Using Revocation Scheme.- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.- e-Commerce Security.- Vulnerability of a Mobile Payment System Proposed at WISA 2002.- Fair Offline Payment Using Verifiable Encryption.- A Limited-Used Key Generation Scheme for Internet Transactions.- Efficient Implementation.- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II.- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Hyperelliptic Curve Coprocessors on a FPGA.- Anonymous Communication.- Key-Exchange Protocol Using Pre-agreed Session-ID.- A New k-Anonymous Message Transmission Protocol.- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack.- Side-Channel Attacks.- Side Channel Cryptanalysis on SEED.- Secure and Efficient AES Software Implementation for Smart Cards.- Practical Template Attacks.- Evaluation and Improvement of the Tempest Fonts.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051482 Information Security Applications (Yongdae Kim; Heejo Lee; Adrian Perrig)
- 9783540240150 Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li (Chae Hoon Lim; Moti Yung)
- Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Lecture Notes ... Science Book 8267) (English Edition) (Gao, Wei, Wang, Guilin, Wang, Xueli, Xie (auth.), Dongqing, Lee, Jae Kwang, Yi, Okyeon, Yung (eds.), Moti)
< zum Archiv...