Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - Taschenbuch
2004, ISBN: 3540208275
[EAN: 9783540208273], Neubuch, [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / KRYPTOGRAFIE; VERSCHLÜSSELUNG; PUBLICKEY; SIGNATUR; ARCHITECTURE; DATASECURI… Mehr…
AbeBooks.de AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
2015, ISBN: 9783540208273
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government b… Mehr…
booklooker.de |
2003, ISBN: 9783540208273
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…
Indigo.ca new in stock. Versandkosten:zzgl. Versandkosten. Details... |
2003, ISBN: 9783540208273
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…
Orellfuessli.ch Nr. A1020425853. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 4 - 7 Werktagen, zzgl. Versandkosten. (EUR 17.17) Details... |
2003, ISBN: 9783540208273
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…
Springer.com Nr. 978-3-540-20827-3. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
Information Security Applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - Taschenbuch
2004, ISBN: 3540208275
[EAN: 9783540208273], Neubuch, [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / KRYPTOGRAFIE; VERSCHLÜSSELUNG; PUBLICKEY; SIGNATUR; ARCHITECTURE; DATASECURI… Mehr…
2015, ISBN: 9783540208273
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government b… Mehr…
2003
ISBN: 9783540208273
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…
2003, ISBN: 9783540208273
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…
2003, ISBN: 9783540208273
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptolo… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers
EAN (ISBN-13): 9783540208273
ISBN (ISBN-10): 3540208275
Taschenbuch
Erscheinungsjahr: 2004
Herausgeber: Springer
524 Seiten
Gewicht: 0,783 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-04-01T10:59:44+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-11-26T12:44:37+01:00 (Zurich)
ISBN/EAN: 9783540208273
ISBN - alternative Schreibweisen:
3-540-20827-5, 978-3-540-20827-3
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: yung
Titel des Buches: computer security, information security applications, lecture notes computer science, motiers 2003
Daten vom Verlag:
Autor/in: Kijoon Chae; Moti Yung
Titel: Lecture Notes in Computer Science; Information Security Applications - 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers
Verlag: Springer; Springer Berlin
512 Seiten
Erscheinungsjahr: 2004-01-15
Berlin; Heidelberg; DE
Sprache: Englisch
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
Available
XII, 512 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Public Key; Signatur; architecture; data security; digital rights management; e-commerce security; information security; intrusion detection; mobile security; model checking; network security; security applications; systems security; verification; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Special Purpose and Application-Based Systems; Operating Systems; Algorithms; IT Operations; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Wissensbasierte Systeme, Expertensysteme; Betriebssysteme; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; EA
Network Security.- Model Checking of Security Protocols with Pre-configuration.- Remote Access VPN with Port Protection Function by Mobile Codes.- A Role of DEVS Simulation for Information Assurance.- Mobile Security.- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.- Reliable Cascaded Delegation Scheme for Mobile Agent Environments.- Practical Solution for Location Privacy in Mobile IPv6.- Intrusion Detection.- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection.- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System.- Towards a Global Security Architecture for Intrusion Detection and Reaction Management.- Internet Security.- Intrusion-Tolerant System Design for Web Server Survivability.- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access.- An Automatic Security Evaluation System for IPv6 Network.- Secure Software, Hardware, and Systems I.- A Location Privacy Protection Mechanism for Smart Space.- Secure System Architecture Based on Dynamic Resource Reallocation.- Fair Exchange with Guardian Angels.- Secure Software, Hardware, and Systems II.- Sign-Based Differential Power Analysis.- Asymmetric Watermarking Scheme Using Permutation Braids.- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ).- E-commerce Security.- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.- Multi-dimensional Hash Chain For Sealed-Bid Auction.- An Improved Forward Integrity Protocol for Mobile Agents.- Digital Rights Management.- Taming “Trusted Platforms” by Operating System Design.- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.- Reducing Storage at Receivers in SD and LSD Broadcast EncryptionSchemes.- Biometrics and Human Interfaces I.- 3D Face Recognition under Pose Varying Environments.- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint.- Fingerprint-Based Authentication for USB Token Systems.- Biometrics and Human Interfaces II.- Iris Recognition System Using Wavelet Packet and Support Vector Machines.- Biometrics Identification and Verification Using Projection-Based Face Recognition System.- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification.- Public Key Cryptography / Key Management.- E-MHT. An Efficient Protocol for Certificate Status Checking.- A Comment on Group Independent Threshold Sharing.- Automation-Considered Logic of Authentication and Key Distribution.- Applied Cryptography.- The MESH Block Ciphers.- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051482 Information Security Applications (Yongdae Kim; Heejo Lee; Adrian Perrig)
- Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Lecture Notes ... Science Book 8267) (English Edition) (Gao, Wei, Wang, Guilin, Wang, Xueli, Xie (auth.), Dongqing, Lee, Jae Kwang, Yi, Okyeon, Yung (eds.), Moti)
< zum Archiv...