ISBN: 9783540414162
The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, Un… Mehr…
Springer.com Nr. 978-3-540-41416-2. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings (Lecture Notes in Computer Science) - Taschenbuch
2000, ISBN: 9783540414162
Springer, 2001-01-12. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Text block clean and unmarked. Tight binding., Springer,… Mehr…
Biblio.co.uk |
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings - Taschenbuch
2000, ISBN: 9783540414162
Paperback / softback. New. The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. Although e-commerce is already booming, it has no… Mehr…
Biblio.co.uk |
2000, ISBN: 9783540414162
*Information Security* - Third International Workshop ISW 2000 Wollongong Australia December 20-21 2000. Proceedings. Auflage 2000 / Taschenbuch für 53.49 € / Aus dem Bereich: Bücher, Rat… Mehr…
Hugendubel.de Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00) Details... |
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings (Lecture Notes in Computer Science) - Taschenbuch
2000, ISBN: 9783540414162
Springer, 2001-01-12. Paperback. Used: Good., Springer, 2001-01-12, 2.5
Biblio.co.uk |
ISBN: 9783540414162
The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, Un… Mehr…
Pieprzyk, Josef [Editor]; Okamoto, Eiji [Editor]; Seberry, Jennifer [Editor];:
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings (Lecture Notes in Computer Science) - Taschenbuch2000, ISBN: 9783540414162
Springer, 2001-01-12. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Text block clean and unmarked. Tight binding., Springer,… Mehr…
Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings - Taschenbuch
2000
ISBN: 9783540414162
Paperback / softback. New. The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. Although e-commerce is already booming, it has no… Mehr…
2000, ISBN: 9783540414162
*Information Security* - Third International Workshop ISW 2000 Wollongong Australia December 20-21 2000. Proceedings. Auflage 2000 / Taschenbuch für 53.49 € / Aus dem Bereich: Bücher, Rat… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security
EAN (ISBN-13): 9783540414162
ISBN (ISBN-10): 3540414169
Taschenbuch
Erscheinungsjahr: 2000
Herausgeber: Springer Berlin Heidelberg
340 Seiten
Gewicht: 0,515 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-04-19T20:49:19+02:00 (Berlin)
Detailseite zuletzt geändert am 2024-02-19T21:02:54+01:00 (Berlin)
ISBN/EAN: 9783540414162
ISBN - alternative Schreibweisen:
3-540-41416-9, 978-3-540-41416-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: okamoto, held josef, eiji
Titel des Buches: december, information security, australia 2000, proceedings information, australia our, proceedings international workshop, lecture notes computer science, wollongong
Daten vom Verlag:
Autor/in: Josef Pieprzyk; Eiji Okamoto; Jennifer Seberry
Titel: Lecture Notes in Computer Science; Information Security - Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings
Verlag: Springer; Springer Berlin
322 Seiten
Erscheinungsjahr: 2000-12-06
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
X, 322 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Authentication; Digital Payment Systems; Digital Signature Schemes; Information Security; Network Security; Privacy; Secure Communication; Signatur; Systems Security; data security; operating system; security; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Algorithms; Operating Systems; IT Operations; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Betriebssysteme; Wirtschaftsmathematik und -informatik, IT-Management; EA
Multimedia Copyright Protection.- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models.- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection.- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.- Region-Based Watermarking by Distribution Adjustment.- Hiding Information in Color Images Using Small Color Palettes.- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.- Characteristics of Some Binary Codes for Fingerprinting.- E-Commerce.- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees.- Unlinkable Divisible Electronic Cash.- Weighted One-Way Hash Chain and Its Applications.- Linkability in Practical Electronic Cash Design.- Towards a Practical Secure Framework for Mobile Code Commerce.- Key Management.- Probabilistic Methods in Multicast Key Management.- Classification of Authentication Protocols: A Practical Approach.- Exploring Fair Exchange Protocols Using Specification Animation.- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.- Network Security and Access Control.- An Efficient Protocol for Certified Electronic Mail.- Performance Analysis of Secure Web Server Based on SSL.- Sherlock: Commercial High Assurance Network Computing Extended Abstract.- The Role of the Development Process in Operating System Security.- Cryptographic Systems.- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.- A Signcryption Scheme Based on Integer Factorization.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9780444892195 INFORMATION SECURITY (LINDSAY, David T & PRICE, Wyn L [editors])
- 9780444892195 INFORMATION SECURITY (LINDSAY, David T & PRICE, Wyn L [editors])
- 9783540444565 Information Security (Eiji Okamoto; Josef Pieprzyk; Jennifer Seberry)
- 9780133589627 Information Security (Jim Breithaupt; Mark S. Merkow)
- 9780071784351 Information Security (The Complete Reference) (Rhodes-Ousley, Mark)
< zum Archiv...