- 5 Ergebnisse
Kleinster Preis: € 88,11, größter Preis: € 104,57, Mittelwert: € 95,03
1
Bestellen
bei lehmanns.de
€ 104,57
Versand: € 0,001
Bestellengesponserter Link
Rei Safavi-Naini; Jennifer Seberry:

Information Security and Privacy - neues Buch

2003, ISBN: 9783540450672

8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, eBooks, eBook Download (PDF),  This book constitutes the refereed proceedings of the… Mehr…

Versandkosten:Download sofort lieferbar. (EUR 0.00)
2
Information Security and Privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings - Aldo de Moor
Bestellen
bei hive.co.uk
£ 76,50
(ca. € 88,11)
Bestellengesponserter Link

Aldo de Moor:

Information Security and Privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings - neues Buch

2003, ISBN: 9783540450672

 This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003.The 42 revi… Mehr…

No. 9783540450672. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
3
Information Security and Privacy
Bestellen
bei Hugendubel.de
€ 96,49
Versand: € 0,001
Bestellengesponserter Link
Information Security and Privacy - neues Buch

2003

ISBN: 9783540450672

Information Security and Privacy ab 96.49 € als pdf eBook: 8th Australasian Conference ACISP 2003 Wollongong Australia July 9-11 2003 Proceedings. Aus dem Bereich: eBooks, Sachthemen & Ra… Mehr…

Nr. 33578002. Versandkosten:, , DE. (EUR 0.00)
4
Information Security and Privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings - David R. Brown
Bestellen
bei hive.co.uk
£ 76,50
(ca. € 89,48)
Bestellengesponserter Link
David R. Brown:
Information Security and Privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings - neues Buch

2003, ISBN: 9783540450672

; PDF; Computing > Computer security > Data encryption, Springer Berlin Heidelberg

No. 9783540450672. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
5
Information Security and Privacy
Bestellen
bei eBook.de
€ 96,49
Versand: € 0,001
Bestellengesponserter Link
Information Security and Privacy - neues Buch

2003, ISBN: 9783540450672

Information Security and Privacy - 8th Australasian Conference ACISP 2003 Wollongong Australia July 9-11 2003 Proceedings: ab 96.49 € Medien > Bücher > E-books, [PU: Springer, Berlin/Heid… Mehr…

Nr. 33578002. Versandkosten:, , DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Information Security and Privacy


EAN (ISBN-13): 9783540450672
Erscheinungsjahr: 2003
Herausgeber: Springer Berlin Heidelberg

Buch in der Datenbank seit 2017-04-25T22:25:10+02:00 (Berlin)
Detailseite zuletzt geändert am 2023-08-21T16:56:10+02:00 (Berlin)
ISBN/EAN: 9783540450672

ISBN - alternative Schreibweisen:
978-3-540-45067-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Titel des Buches: wollongong


Daten vom Verlag:

Autor/in: Rei Safavi-Naini; Jennifer Seberry
Titel: Lecture Notes in Computer Science; Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings
Verlag: Springer; Springer Berlin
540 Seiten
Erscheinungsjahr: 2003-08-03
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 540 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; cryptography; data security; digital; information; privacy; security; algorithm analysis and problem complexity; C; Cryptology; Computer Communication Networks; Operating Systems; Coding and Information Theory; Algorithms; IT Operations; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Informationstheorie; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; BC

Privacy and Anonymity.- Grouping Verifiable Content for Selective Disclosure.- Evaluation of Anonymity of Practical Anonymous Communication Networks.- An Anonymous Credential System and a Privacy-Aware PKI.- Flaws in Some Robust Optimistic Mix-Nets.- Invited Talk (I).- The Unsolvable Privacy Problem and Its Implications for Security Technologies.- Elliptic Curves.- The Security of Fixed versus Random Elliptic Curves in Cryptography.- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains.- Generic GF(2m) Arithmetic in Software and Its Application to ECC.- An Addition Algorithm in Jacobian of C 34 Curve.- Crytpanalysis (I).- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces.- Differential Fault Analysis on AES Key Schedule and Some Countermeasures.- On the Pseudorandomness of KASUMI Type Permutations.- Theoretical Analysis of ?2 Attack on RC6.- Mobile and Network Security.- A Typed Theory for Access Control and Information Flow Control in Mobile Systems.- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications.- Practical Pay TV Schemes.- Cooperative Routers against DoS Attacks.- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs.- Malicious ICMP Tunneling: Defense against the Vulnerability.- On Fair E-cash Systems Based on Group Signature Schemes.- Invited Talk (II).- A Taxonomy of Single Sign-On Systems.- Cryptanalysis (II).- Key Recovery Attacks on the RMAC, TMAC, and IACBC.- Key Recovery Attacks on NTRU without Ciphertext Validation Routine.- Permanent Fault Attack on the Parameters of RSA with CRT.- Backdoor Attacks on Black-Box Ciphers ExploitingLow-Entropy Plaintexts.- Signature.- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.- Digital Signature Schemes with Restriction on Signing Capability.- On the Exact Security of Multi-signature Schemes Based on RSA.- Cryptosystems (I).- A Length-Flexible Threshold Cryptosystem with Applications.- Separating Encryption and Key Issuance in Digital Rights Management Systems.- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.- Parallel Authentication and Public-Key Encryption.- Invited Talk (III).- Is Cross-Platform Security Possible?.- Cryptosystems (II).- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems.- Cryptanalysis of a New Cellular Automata Cryptosystem.- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers.- Clock-Controlled Shrinking Generator of Feedback Shift Registers.- Key Management.- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange.- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join.- Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity.- Theory and Hash Functions.- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.- New Constructions for Resilient and Highly Nonlinear Boolean Functions.- On Parallel Hash Functions Based on Block-Cipher.- Square Hash with a Small Key Size.

< zum Archiv...