Information Security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings - neues Buch
2004, ISBN: 3540232087
2004 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Wirtschaftsmathematik und -informatik, IT-Management, Ethische… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science, 3225, Band 3225) - Taschenbuch
2008, ISBN: 9783540232087
Springer, Taschenbuch, Auflage: 2004, 456 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 1, 1.41 kg, E-Business, Business & Karriere, Kategorien, Bücher, I… Mehr…
amazon.de Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science, 3225, Band 3225) - Taschenbuch
2008, ISBN: 9783540232087
Springer, Taschenbuch, Auflage: 2004, 456 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 1, 1.41 kg, E-Business, Business & Karriere, Kategorien, Bücher, I… Mehr…
amazon.de |
2004, ISBN: 9783540232087
Editor: Zhang, Kan, Editor: Zheng, Yuliang, Springer, Paperback, Auflage: 2004, 454 Seiten, Publiziert: 2004-09-17T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 1, 1.41 kg, Special Feat… Mehr…
amazon.co.uk BOOKS etc Gebraucht, wie neu. Versandkosten:Usually dispatched within 13 to 14 days. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.55) Details... |
2004, ISBN: 9783540232087
Taschenbuch
7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, Buch, Softcover, [PU: Springer Berlin], [ED: 1], Springer Berlin, 2004
lehmanns.de Versandkosten:Versand in 10-14 Tagen. (EUR 0.00) Details... |
Information Security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings - neues Buch
2004, ISBN: 3540232087
2004 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Wirtschaftsmathematik und -informatik, IT-Management, Ethische… Mehr…
Zhang, Kan, Zheng, Yuliang:
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science, 3225, Band 3225) - Taschenbuch2008, ISBN: 9783540232087
Springer, Taschenbuch, Auflage: 2004, 456 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 1, 1.41 kg, E-Business, Business & Karriere, Kategorien, Bücher, I… Mehr…
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Lecture Notes in Computer Science, 3225, Band 3225) - Taschenbuch
2008
ISBN: 9783540232087
Springer, Taschenbuch, Auflage: 2004, 456 Seiten, Publiziert: 2008-06-13T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 1, 1.41 kg, E-Business, Business & Karriere, Kategorien, Bücher, I… Mehr…
2004, ISBN: 9783540232087
Editor: Zhang, Kan, Editor: Zheng, Yuliang, Springer, Paperback, Auflage: 2004, 454 Seiten, Publiziert: 2004-09-17T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: 1, 1.41 kg, Special Feat… Mehr…
2004, ISBN: 9783540232087
Taschenbuch
7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, Buch, Softcover, [PU: Springer Berlin], [ED: 1], Springer Berlin, 2004
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings: 3225 (Lecture Notes in Computer Science, 3225)
EAN (ISBN-13): 9783540232087
ISBN (ISBN-10): 3540232087
Taschenbuch
Erscheinungsjahr: 2004
Herausgeber: Springer
460 Seiten
Gewicht: 0,690 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-05-24T21:52:39+02:00 (Berlin)
Detailseite zuletzt geändert am 2023-10-11T12:41:18+02:00 (Berlin)
ISBN/EAN: 9783540232087
ISBN - alternative Schreibweisen:
3-540-23208-7, 978-3-540-23208-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: kan, zheng, zhang
Titel des Buches: computer security, information security, notes, usa, palo alto
Daten vom Verlag:
Autor/in: Kan Zhang; Yuliang Zheng
Titel: Lecture Notes in Computer Science; Information Security - 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Verlag: Springer; Springer Berlin
442 Seiten
Erscheinungsjahr: 2004-09-17
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 442 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; RSA; Smart Card; algorithms; anonymity; data security; digital payment; digital signature schemes; network security; person authentication; privacy; secure communications; security; systems security; trust; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Operating Systems; Algorithms; Computers and Society; IT Operations; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Algorithmen und Datenstrukturen; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; EA
Key Management.- Practical Authenticated Key Agreement Using Passwords.- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks.- Storage-Efficient Stateless Group Key Revocation.- Digital Signatures.- Low-Level Ideal Signatures and General Integrity Idealization.- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA.- How to Break and Repair a Universally Composable Signature Functionality.- New Algorithms.- RSA Accumulator Based Broadcast Encryption.- Chameleon Hashing Without Key Exposure.- Radix-r Non-Adjacent Form.- Cryptanalysis.- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor.- Security Analysis of Two Signcryption Schemes.- On The Security of Key Derivation Functions.- Intrusion Detection.- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.- A Model for the Semantics of Attack Signatures in Misuse Detection Systems.- Detection of Sniffers in an Ethernet Network.- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.- Securing DBMS: Characterizing and Detecting Query Floods.- Access Control.- An XML-Based Approach to Document Flow Verification.- Model-Checking Access Control Policies.- A Distributed High Assurance Reference Monitor.- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control.- Human Authentication.- Towards Human Interactive Proofs in the Text-Domain.- Image Recognition CAPTCHAs.- Certificate Management.- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model.- Certificate Recommendations to Improve the Robustness of Web of Trust.- Mobile and Ad Hoc Security.- Universally Composable Secure Mobile Agent Computation.- Re-thinking Security in IP Based Micro-Mobility.- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.- Web Security.- Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions.- Provable Unlinkability Against Traffic Analysis Already After Steps!.- An Efficient Online Electronic Cash with Unlinkable Exact Payments.- Digital Rights Management.- Modifiable Digital Content Protection in P2P.- Survey on the Technological Aspects of Digital Rights Management.- Detecting Software Theft via Whole Program Path Birthmarks.- Software Security.- Effective Security Requirements Analysis: HAZOP and Use Cases.- The Obfuscation Executive.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9781908272782 Proceedings of the 7th International Conference on Information Warfare and Security (Dr. Volodymyr Lysenko)
- 9781908272782 Proceedings of the 7th International Conference on Information Warfare and Security (Dr. Volodymyr Lysenko)
- 9783319132563 Information Security (Herausgegeben:Chow, Sherman S. M.; Yiu, Siu Ming; Hui, Lucas C.K.; Camenisch, Jan)
- 9780387096995 Proceedings of the IFIP TC 11 23rd International Information Security Conference (Stelvio Cimato; Sushil Jajodia; Pierangela Samarati)
- 9781441935205 Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, (Sushil Jajodia (Editor), Pierangela Samarati (Editor), Stelvio Cimato (Editor))
- 9780387561462 Proceedings of the Ifip Tc 11 23rd International Information Security Conference (H. J. Bullinger)
- 9780387096988 Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008 (Sushil Jajodia; Pierangela Samarati; Stelvio Cimato)
- Spatial Information Theory: 12th International Conference, COSIT 2015, Santa Fe, NM, USA, October 12-16, 2015, Proceedings (Lecture Notes in Computer Science Book 9368)
< zum Archiv...