2009, ISBN: 9783642111457
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14-17, 2009.The ICICS conferenceseriesis anestablished forum t… Mehr…
hive.co.uk No. 9783642111457. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2009, ISBN: 9783642111457
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14-17, 2009. The ICICS conferenceseriesis anestablished forum … Mehr…
Orellfuessli.ch Nr. A1038354538. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 17.17) Details... |
2009, ISBN: 9783642111457
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14–17, 2009. The ICICS conferenceseriesis anestablished forum … Mehr…
Springer.com Nr. 978-3-642-11145-7. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details... |
2009, ISBN: 9783642111457
; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg
hive.co.uk No. 9783642111457. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2009, ISBN: 9783642111457
11th International Conference, ICICS 2009, eBooks, eBook Download (PDF), [PU: Springer Berlin], Springer Berlin, 2009
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2009, ISBN: 9783642111457
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14-17, 2009.The ICICS conferenceseriesis anestablished forum t… Mehr…
2009, ISBN: 9783642111457
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14-17, 2009. The ICICS conferenceseriesis anestablished forum … Mehr…
2009
ISBN: 9783642111457
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14–17, 2009. The ICICS conferenceseriesis anestablished forum … Mehr…
2009, ISBN: 9783642111457
; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg
2009, ISBN: 9783642111457
11th International Conference, ICICS 2009, eBooks, eBook Download (PDF), [PU: Springer Berlin], Springer Berlin, 2009
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information and Communications Security
EAN (ISBN-13): 9783642111457
ISBN (ISBN-10): 3642111459
Erscheinungsjahr: 2009
Herausgeber: Springer Berlin
14 Seiten
Sprache: eng/Englisch
Buch in der Datenbank seit 2011-05-18T23:33:25+02:00 (Berlin)
Detailseite zuletzt geändert am 2024-03-24T17:37:17+01:00 (Berlin)
ISBN/EAN: 9783642111457
ISBN - alternative Schreibweisen:
3-642-11145-9, 978-3-642-11145-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: mitchell, chris, udo lindemann
Titel des Buches: information security, communications
Daten vom Verlag:
Autor/in: Sihan Qing; Chris J. Mitchell; Guilin Wang
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information and Communications Security - 11th International Conference, ICICS 2009
Verlag: Springer; Springer Berlin
504 Seiten
Erscheinungsjahr: 2010-01-13
Berlin; Heidelberg; DE
Sprache: Englisch
96,29 € (DE)
99,00 € (AT)
118,00 CHF (CH)
Available
XIV, 504 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Camellia; access control; algorithms; anomaly detection; anonymity system; association rules mining; authentication; biometric data; block cipher; collaborative filtering; communication; cryptanalysis; cryptographic protocols; cryptography; information; C; Cryptology; Computer Communication Networks; Programming Techniques; Data Structures and Information Theory; Coding and Information Theory; Data and Information Security; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Computerprogrammierung und Softwareentwicklung; Algorithmen und Datenstrukturen; Informationstheorie; Computersicherheit; Netzwerksicherheit; BC
Invited Talks.- How to Steal a Botnet and What Can Happen When You Do.- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing.- Cryptanalysis.- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher.- Algorithms and Implementations.- The rakaposhi Stream Cipher.- Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes.- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.- Public Key Cryptography.- Online/Offline Ring Signature Scheme.- Policy-Controlled Signatures.- Public Key Encryption without Random Oracle Made Truly Practical.- A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate.- Security Applications.- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.- Biometric-Based Non-transferable Anonymous Credentials.- Software Security.- Secure Remote Execution of Sequential Computations.- Architecture- and OS-Independent Binary-Level Dynamic Test Generation.- System Security.- Measuring Information Flow in Reactive Processes.- Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.- Denial-of-Service Attacks on Host-Based Generic Unpackers.- Network Security.- Predictive Pattern Matching for Scalable Network Intrusion Detection.- Deterministic Finite Automata Characterization for Memory-Based Pattern Matching.- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.- User-Assisted Host-Based Detection of Outbound Malware Traffic.- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence.- Short Papers I.- Using the (Open) Solaris Service Management Facility as a Building Block for System Security.- IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper].- Database Security.- Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining.- GUC-Secure Join Operator in Distributed Relational Database.- Trust Management.- TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.- Bring Efficient Connotation Expressible Policies to Trust Management.- A User Trust-Based Collaborative Filtering Recommendation Algorithm.- Applied Cryptography.- Fingerprinting Attack on the Tor Anonymity System.- Proactive Verifiable Linear Integer Secret Sharing Scheme.- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach.- Digital Audio Watermarking Technique Using Pseudo-Zernike Moments.- Short Papers II.- An Image Sanitizing Scheme Using Digital Watermarking.- Adaptive and Composable Oblivious Transfer Protocols (Short Paper).- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783540636960 Information and Communications Security (Han Yongfei/ Tatsuaki Okamoto/ Quing Sihan)
- 9783540428800 Information and Communications Security: Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceeding (Tatsuaki Okamoto; Jianying Zhou)
- Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Lecture Notes in Computer Science) (2008-06-13) (Dennis Beck, Anasol Peña-Rios, Todd Ogle, Daphne Economou, Markos Mentzelopoulos, Leonel Morgado, Christian Eckhardt, Johanna Pirker, Roxane Koitz-Hristov, Jonathon Richter, Christian Gütl, Michael Gardner)
< zum Archiv...