2004, ISBN: 9783540240150
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
BarnesandNoble.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
2004, ISBN: 9783540240150
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
Springer.com Nr. 978-3-540-24015-0. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
2004, ISBN: 9783540240150
Springer. Used - Good. Ships from UK in 48 hours or less (usually same day). Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so s… Mehr…
Biblio.co.uk |
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - neues Buch
2005, ISBN: 3540240152
2005 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - neues Buch
2005, ISBN: 3540240152
2005 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li - neues Buch
2004, ISBN: 9783540240150
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
2004, ISBN: 9783540240150
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…
2004
ISBN: 9783540240150
Springer. Used - Good. Ships from UK in 48 hours or less (usually same day). Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so s… Mehr…
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - neues Buch
2005, ISBN: 3540240152
2005 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - neues Buch
2005, ISBN: 3540240152
2005 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li
EAN (ISBN-13): 9783540240150
ISBN (ISBN-10): 3540240152
Taschenbuch
Erscheinungsjahr: 2005
Herausgeber: Springer Berlin Heidelberg Core >1 >T
488 Seiten
Gewicht: 0,731 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-03-24T17:43:42+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-01-31T12:22:20+01:00 (Zurich)
ISBN/EAN: 9783540240150
ISBN - alternative Schreibweisen:
3-540-24015-2, 978-3-540-24015-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: lim, yung, anderson
Titel des Buches: computer security, information security applications, note information, korea, island
Daten vom Verlag:
Autor/in: Chae Hoon Lim; Moti Yung
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security Applications - 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Verlag: Springer; Springer Berlin
474 Seiten
Erscheinungsjahr: 2005-02-09
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 474 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Linux; Smart Card; applied cryptography; communication; computer security; cryptographic attacks; data security; information security; intrusion detection; privacy; public key cryptography; secure networking; security; systems security; algorithm analysis and problem complexity; Cryptology; Operating Systems; Algorithms; Computer Communication Networks; IT Operations; Special Purpose and Application-Based Systems; Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Algorithmen und Datenstrukturen; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; EA
Network/Computer Security.- Impacts of Security Protocols on Real-Time Multimedia Communications.- An Improvement on Privacy and Authentication in GSM.- Encrypted Watermarks and Linux Laptop Security.- Inconsistency Detection of Authorization Policies in Distributed Component Environment.- Public Key Schemes I.- Custodian-Hiding Verifiable Encryption.- Proving Key Usage.- Public Key Encryption with Conjunctive Field Keyword Search.- Intrusion Detection I.- A Probabilistic Method for Detecting Anomalous Program Behavior.- Service Discrimination and Audit File Reduction for Effective Intrusion Detection.- IDS False Alarm Filtering Using KNN Classifier.- Watermarking/Anti-spamming.- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking.- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.- Public Key Schemes II.- Efficient Authenticated Key Agreement Protocol for Dynamic Groups.- A Ring Signature Scheme Using Bilinear Pairings.- Verifiable Pairing and Its Applications.- Intrusion Detection II.- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading.- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks.- Application of Content Computing in Honeyfarm.- Digital Rights Management.- License Protection with a Tamper-Resistant Token.- An Adaptive Approach to Hardware Alteration for Digital Rights Management.- Dynamic Fingerprinting over Broadcast Using Revocation Scheme.- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.- e-Commerce Security.- Vulnerability of a Mobile Payment System Proposed at WISA 2002.- Fair Offline Payment Using Verifiable Encryption.- A Limited-Used Key Generation Scheme for Internet Transactions.- Efficient Implementation.- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II.- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Hyperelliptic Curve Coprocessors on a FPGA.- Anonymous Communication.- Key-Exchange Protocol Using Pre-agreed Session-ID.- A New k-Anonymous Message Transmission Protocol.- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack.- Side-Channel Attacks.- Side Channel Cryptanalysis on SEED.- Secure and Efficient AES Software Implementation for Smart Cards.- Practical Template Attacks.- Evaluation and Improvement of the Tempest Fonts.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051499 Information Security Applications (Adrian Perrig, Heejo Lee, Yongdae Kim)
- 9783319051482 Information Security Applications (Yongdae Kim; Heejo Lee; Adrian Perrig)
- Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Lecture Notes ... Science Book 8267) (English Edition) (Gao, Wei, Wang, Guilin, Wang, Xueli, Xie (auth.), Dongqing, Lee, Jae Kwang, Yi, Okyeon, Yung (eds.), Moti)
< zum Archiv...