2015, ISBN: 9783540235637
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),… Mehr…
booklooker.de |
2004, ISBN: 9783540235637
This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), Spain,27 29 October 2004. The ?ve previou… Mehr…
Orellfuessli.ch Nr. A1000716030. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 6 - 9 Werktagen, zzgl. Versandkosten. (EUR 17.60) Details... |
Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings - neues Buch
2004, ISBN: 3540235639
2004 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaf… Mehr…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science, 3269, Band 3269) - Taschenbuch
2004, ISBN: 9783540235637
Springer, Taschenbuch, Auflage: 2004, 584 Seiten, Publiziert: 2004-12-16T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: part_3540235639, 3.92 kg, Informationsmanagement, Management, Busi… Mehr…
amazon.de Krocoworld Gut Versandkosten:Auf Lager. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
2004, ISBN: 9783540235637
Taschenbuch
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. On the Minimal Assumption… Mehr…
booklooker.de |
2015, ISBN: 9783540235637
[ED: Taschenbuch], [PU: Springer Berlin Heidelberg], Neuware - This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),… Mehr…
2004, ISBN: 9783540235637
This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), Spain,27 29 October 2004. The ?ve previou… Mehr…
Information and Communications Security 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings - neues Buch
2004
ISBN: 3540235639
2004 Kartoniert / Broschiert Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Kodierungstheorie und Verschlüsselung (Kryptologie), Wirtschaf… Mehr…
Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science, 3269, Band 3269) - Taschenbuch
2004, ISBN: 9783540235637
Springer, Taschenbuch, Auflage: 2004, 584 Seiten, Publiziert: 2004-12-16T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: part_3540235639, 3.92 kg, Informationsmanagement, Management, Busi… Mehr…
2004, ISBN: 9783540235637
Taschenbuch
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. On the Minimal Assumption… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Lecture Notes in Computer Science, 3269, Band 3269)
EAN (ISBN-13): 9783540235637
ISBN (ISBN-10): 3540235639
Taschenbuch
Erscheinungsjahr: 2004
Herausgeber: Springer
564 Seiten
Gewicht: 0,871 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-05-25T09:31:31+02:00 (Berlin)
Detailseite zuletzt geändert am 2023-08-31T14:04:12+02:00 (Berlin)
ISBN/EAN: 3540235639
ISBN - alternative Schreibweisen:
3-540-23563-9, 978-3-540-23563-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: okamoto, qing, lopez, eiji
Titel des Buches: malaga, october 2004, computer security, information security, notes, conference proceedings communications
Daten vom Verlag:
Autor/in: Javier López; Eiji Okamoto
Titel: Lecture Notes in Computer Science; Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings
Verlag: Springer; Springer Berlin
572 Seiten
Erscheinungsjahr: 2004-10-15
Berlin; Heidelberg; DE
Sprache: Englisch
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
Available
XII, 572 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Kernel; access control; algorithms; calculus; cryptology; data security; database; digital signatures; information security; network security; security; security engineering; systems security; verification; algorithm analysis and problem complexity; Cryptology; Discrete Mathematics in Computer Science; Operating Systems; IT Operations; Algorithms; Computer Communication Networks; Kryptografie, Verschlüsselungstechnologie; Mathematik für Informatiker; Diskrete Mathematik; Betriebssysteme; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; Netzwerk-Hardware; EA
On the Minimal Assumptions of Group Signature Schemes.- Perfect Concurrent Signature Schemes.- New Identity-Based Ring Signature Schemes.- On the Security of a Multi-party Certified Email Protocol.- Robust Metering Schemes for General Access Structures.- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks.- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.- Provably Secure Authenticated Tree Based Group Key Agreement.- Taxonomic Consideration to OAEP Variants and Their Security.- Factorization-Based Fail-Stop Signatures Revisited.- A Qualitative Evaluation of Security Patterns.- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.- Volatile Memory Computer Forensics to Detect Kernel Level Compromise.- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet.- Hydan: Hiding Information in Program Binaries.- A Semi-fragile Steganographic Digital Signature for Images.- Identification of Traitors Using a Trellis.- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.- Reflector Attack Traceback System with Pushback Based iTrace Mechanism.- Automatic Covert Channel Analysis of a Multilevel Secure Component.- Sound Approximations to Diffie-Hellman Using Rewrite Rules.- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks.- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection.- Threat Analysis on NEtwork MObility (NEMO).- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub InfrastructureConcept.- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV).- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.- Security Analysis of the Generalized Self-shrinking Generator.- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.- On Some Weak Extensions of AES and BES.- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario.- Transient Fault Induction Attacks on XTR.- Adaptive-CCA on OpenPGP Revisited.- A New Key-Insulated Signature Scheme.- Secure Hierarchical Identity Based Signature and Its Application.- Multi-designated Verifiers Signatures.- Dynamic Access Control for Multi-privileged Group Communications.- An Efficient Authentication Scheme Using Recovery Information in Signature.- Time-Scoped Searching of Encrypted Audit Logs.- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9780780336766 Proceedings of 1997 International Conference on Information, Communications and Signal Processing: 9-12 September 1997, Singapore (Communications, and Signal Processing (1st : 1997 : Singapore) International Conference on Information)
- 9783540428800 Information and Communications Security: Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceeding (Tatsuaki Okamoto; Jianying Zhou)
- Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Lecture Notes in Computer Science) (2008-06-13) (Dennis Beck, Anasol Peña-Rios, Todd Ogle, Daphne Economou, Markos Mentzelopoulos, Leonel Morgado, Christian Eckhardt, Johanna Pirker, Roxane Koitz-Hristov, Jonathon Richter, Christian Gütl, Michael Gardner)
< zum Archiv...