- 5 Ergebnisse
Kleinster Preis: € 42,73, größter Preis: € 105,65, Mittelwert: € 62,49
1
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li
Bestellen
bei BarnesandNoble.com
€ 54,99
Bestellengesponserter Link

Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li - neues Buch

2004, ISBN: 9783540240150

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Information Security Applications
Bestellen
bei Springer.com
€ 53,49
Versand: € 0,001
Bestellengesponserter Link
Information Security Applications - neues Buch

2004, ISBN: 9783540240150

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute… Mehr…

Nr. 978-3-540-24015-0. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00)
3
Bestellen
bei Biblio.co.uk
$ 46,80
(ca. € 42,73)
Versand: € 10,621
Bestellengesponserter Link
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers (Lecture Notes in Computer Science, 3325) - gebrauchtes Buch

2004

ISBN: 9783540240150

Springer. Used - Good. Ships from UK in 48 hours or less (usually same day). Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so s… Mehr…

Versandkosten: EUR 10.62 Phatpocket Limited
4
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - Yung, Moti (Herausgeber); Lim, Chae Hoon (Herausgeber)
Bestellen
bei Achtung-Buecher.de
€ 105,65
Versand: € 0,001
Bestellengesponserter Link
Yung, Moti (Herausgeber); Lim, Chae Hoon (Herausgeber):
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - neues Buch

2005, ISBN: 3540240152

2005 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
5
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - Yung, Moti (Herausgeber); Lim, Chae Hoon (Herausgeber)
Bestellen
bei Achtung-Buecher.de
€ 55,60
Versand: € 0,001
Bestellengesponserter Link
Yung, Moti (Herausgeber); Lim, Chae Hoon (Herausgeber):
Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers - neues Buch

2005, ISBN: 3540240152

2005 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaftsmathematik und -informatik, I… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li

This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004.The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.

Detailangaben zum Buch - Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Chae Hoon Li


EAN (ISBN-13): 9783540240150
ISBN (ISBN-10): 3540240152
Taschenbuch
Erscheinungsjahr: 2005
Herausgeber: Springer Berlin Heidelberg Core >1 >T
488 Seiten
Gewicht: 0,731 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2007-03-24T17:43:42+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-01-31T12:22:20+01:00 (Zurich)
ISBN/EAN: 9783540240150

ISBN - alternative Schreibweisen:
3-540-24015-2, 978-3-540-24015-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: lim, yung, anderson
Titel des Buches: computer security, information security applications, note information, korea, island


Daten vom Verlag:

Autor/in: Chae Hoon Lim; Moti Yung
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security Applications - 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Verlag: Springer; Springer Berlin
474 Seiten
Erscheinungsjahr: 2005-02-09
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 474 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Linux; Smart Card; applied cryptography; communication; computer security; cryptographic attacks; data security; information security; intrusion detection; privacy; public key cryptography; secure networking; security; systems security; algorithm analysis and problem complexity; Cryptology; Operating Systems; Algorithms; Computer Communication Networks; IT Operations; Special Purpose and Application-Based Systems; Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Algorithmen und Datenstrukturen; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; EA

Network/Computer Security.- Impacts of Security Protocols on Real-Time Multimedia Communications.- An Improvement on Privacy and Authentication in GSM.- Encrypted Watermarks and Linux Laptop Security.- Inconsistency Detection of Authorization Policies in Distributed Component Environment.- Public Key Schemes I.- Custodian-Hiding Verifiable Encryption.- Proving Key Usage.- Public Key Encryption with Conjunctive Field Keyword Search.- Intrusion Detection I.- A Probabilistic Method for Detecting Anomalous Program Behavior.- Service Discrimination and Audit File Reduction for Effective Intrusion Detection.- IDS False Alarm Filtering Using KNN Classifier.- Watermarking/Anti-spamming.- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking.- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.- Public Key Schemes II.- Efficient Authenticated Key Agreement Protocol for Dynamic Groups.- A Ring Signature Scheme Using Bilinear Pairings.- Verifiable Pairing and Its Applications.- Intrusion Detection II.- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading.- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks.- Application of Content Computing in Honeyfarm.- Digital Rights Management.- License Protection with a Tamper-Resistant Token.- An Adaptive Approach to Hardware Alteration for Digital Rights Management.- Dynamic Fingerprinting over Broadcast Using Revocation Scheme.- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.- e-Commerce Security.- Vulnerability of a Mobile Payment System Proposed at WISA 2002.- Fair Offline Payment Using Verifiable Encryption.- A Limited-Used Key Generation Scheme for Internet Transactions.- Efficient Implementation.- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II.- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.- Hyperelliptic Curve Coprocessors on a FPGA.- Anonymous Communication.- Key-Exchange Protocol Using Pre-agreed Session-ID.- A New k-Anonymous Message Transmission Protocol.- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack.- Side-Channel Attacks.- Side Channel Cryptanalysis on SEED.- Secure and Efficient AES Software Implementation for Smart Cards.- Practical Template Attacks.- Evaluation and Improvement of the Tempest Fonts.
Includes supplementary material: sn.pub/extras

< zum Archiv...