- 5 Ergebnisse
Kleinster Preis: € 14,90, größter Preis: € 81,99, Mittelwert: € 52,41
1
Cryptology and Network Security  9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings  Swee-Huay Heng (u. a.)  Taschenbuch  Book  Englisch  2010 - Heng, Swee-Huay
Bestellen
bei booklooker.de
€ 14,90
Versand: € 0,001
Bestellengesponserter Link
Heng, Swee-Huay:

Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings Swee-Huay Heng (u. a.) Taschenbuch Book Englisch 2010 - Taschenbuch

2010, ISBN: 9783642176180

[ED: Taschenbuch], [PU: Springer Berlin], The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. T… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) preigu
2
Cryptology and Network Security - Springer Berlin
Bestellen
bei Thalia.de
€ 81,99
Versand: € 0,001
Bestellengesponserter Link

Springer Berlin:

Cryptology and Network Security - Taschenbuch

2010, ISBN: 9783642176180

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized b… Mehr…

Nr. 25765682. Versandkosten:, Sofort lieferbar, DE. (EUR 0.00)
3
Cryptology and Network Security - Swee-Huay Heng; Rebecca N. Wright; Bok-Min Goi
Bestellen
bei Springer.com
€ 74,89
Versand: € 0,001
Bestellengesponserter Link
Swee-Huay Heng; Rebecca N. Wright; Bok-Min Goi:
Cryptology and Network Security - Taschenbuch

2010

ISBN: 9783642176180

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12â??14, 2010. The conference was co-organized by the Mu… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00)
4
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings (Lecture Notes in Computer Science, 6467, Band 6467)
Bestellen
bei amazon.de
€ 47,22
Versand: € 3,991
Bestellengesponserter Link
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings (Lecture Notes in Computer Science, 6467, Band 6467) - Taschenbuch

2010, ISBN: 9783642176180

Springer, Taschenbuch, Auflage: 2010, 368 Seiten, Publiziert: 2010-11-22T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 9783642176180, 1.24 kg, Kryptografie, Sicherheit, Computer & Inter… Mehr…

Versandkosten:Auf Lager. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.99) ausverkauf
5
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings - Heng, Swee-Huay, Rebecca N. Wright  und Bok-Min Goi
Bestellen
bei booklooker.de
€ 43,06
Versand: € 9,901
Bestellengesponserter Link
Heng, Swee-Huay, Rebecca N. Wright und Bok-Min Goi:
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings - gebrauchtes Buch

2010, ISBN: 9783642176180

[PU: Springer Berlin], Neubindung, Buchrücken leicht geknickt 10044359/12, DE, [SC: 9.90], gebraucht; sehr gut, gewerbliches Angebot, 2010, Banküberweisung, Kreditkarte, PayPal, Klarna-So… Mehr…

Versandkosten:Versand nach Österreich. (EUR 9.90) Buchpark GmbH

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings (Lecture Notes in Computer Science, 6467, Band 6467)

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2 invited talks, were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on block ciphers, wireless network security, hash functions, public key cryptography, secure mechanisms, cryptographic protocols, and anonymous credentials.

Detailangaben zum Buch - Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings (Lecture Notes in Computer Science, 6467, Band 6467)


EAN (ISBN-13): 9783642176180
ISBN (ISBN-10): 3642176186
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2010
Herausgeber: Heng, Swee-Huay, Wright, Rebecca N. Goi, Bok-Min, Springer
353 Seiten
Gewicht: 0,560 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2007-09-03T05:20:28+02:00 (Berlin)
Detailseite zuletzt geändert am 2024-01-13T19:39:57+01:00 (Berlin)
ISBN/EAN: 9783642176180

ISBN - alternative Schreibweisen:
3-642-17618-6, 978-3-642-17618-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: bök, jürgen neukirch, von wright, heng, swee
Titel des Buches: kuala lumpur international, network security, proceedings the second international conference, malaysia, klassenkörpertheorie, network science


Daten vom Verlag:

Autor/in: Swee-Huay Heng; Rebecca N. Wright; Bok-Min Goi
Titel: Security and Cryptology; Lecture Notes in Computer Science; Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings
Verlag: Springer; Springer Berlin
355 Seiten
Erscheinungsjahr: 2010-11-22
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 355 p. 66 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; CCMP; Crib; SHA-3; Skein; X.509; block ciphers; cryptanalysis; cryptographic protocols; cryptography; cryptology; hash functions; networks; wireless networks; wireless sensor; Cryptology; Computer Communication Networks; Programming Techniques; Discrete Mathematics in Computer Science; Coding and Information Theory; Data Structures and Information Theory; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Computerprogrammierung und Softwareentwicklung; Mathematik für Informatiker; Diskrete Mathematik; Informationstheorie; Algorithmen und Datenstrukturen; EA

Block Ciphers.- Cryptanalysis of Reduced-Round MIBS Block Cipher.- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds.- An Algorithm Based Concurrent Error Detection Scheme for AES.- Invited Talk I.- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk).- Wireless Network Security.- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP.- User Tracking Based on Behavioral Fingerprints.- Hash Functions.- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions.- Integral Distinguishers of Some SHA-3 Candidates.- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE.- Public Key Cryptography.- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems.- Generating Parameters for Algebraic Torus-Based Cryptosystems.- Analysis of the MQQ Public Key Cryptosystem.- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations.- Invited Talk II.- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).- Secure Mechanisms.- Towards a Cryptographic Treatment of Publish/Subscribe Systems.- STE3D-CAP: Stereoscopic 3D CAPTCHA.- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism.- Cryptographic Protocols.- Dynamic Group Key Exchange Revisited.- Towards Practical and Secure Coercion-Resistant Electronic Elections.- Anonymous Credentials.- Predicate Encryption with Partial Public Keys.- Anonymous Credential Schemes with Encrypted Attributes.- One Time Anonymous Certificate: X.509 Supporting Anonymity.
Fast track conference proceedings

< zum Archiv...