- 5 Ergebnisse
Kleinster Preis: € 88,53, größter Preis: € 135,32, Mittelwert: € 106,95
1
Applied Cryptography and Network Security
Bestellen
bei Orellfuessli.ch
CHF 141,90
(ca. € 135,32)
Versand: € 17,171
Bestellengesponserter Link

Applied Cryptography and Network Security - neues Buch

2007, ISBN: 9783540727385

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revise… Mehr…

Nr. A1038257792. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 17.17)
2
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings - Arnd-Oliver Schafer
Bestellen
bei hive.co.uk
£ 76,50
(ca. € 88,53)
Bestellengesponserter Link

Arnd-Oliver Schafer:

Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings - neues Buch

2007, ISBN: 9783540727385

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revise… Mehr…

No. 9783540727385. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
3
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings - Adam Grzech
Bestellen
bei hive.co.uk
£ 76,50
(ca. € 90,35)
Bestellengesponserter Link
Adam Grzech:
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings - neues Buch

2007

ISBN: 9783540727385

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revise… Mehr…

No. 9783540727385. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
4
Applied Cryptography and Network Security - Springer
Bestellen
bei Orellfuessli.ch
CHF 141,90
(ca. € 130,77)
Versand: € 16,591
Bestellengesponserter Link
Springer:
Applied Cryptography and Network Security - neues Buch

2007, ISBN: 9783540727385

This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revise… Mehr…

Nr. 44261239. Versandkosten:, Sofort per Download lieferbar, zzgl. Versandkosten, Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage. (EUR 16.59)
5
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings - Elzbieta Halas
Bestellen
bei hive.co.uk
£ 76,50
(ca. € 89,78)
Bestellengesponserter Link
Elzbieta Halas:
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings - neues Buch

2007, ISBN: 9783540727385

; PDF; Computing > Computer hardware > Network hardware, Peter Lang GmbH, Internationaler Verlag der Wissen

No. 9783540727385. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Applied Cryptography and Network Security


EAN (ISBN-13): 9783540727385
Erscheinungsjahr: 2007
Herausgeber: Jonathan Katz#Moti Young

Buch in der Datenbank seit 2016-02-24T13:56:40+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-03-12T19:54:39+01:00 (Berlin)
ISBN/EAN: 9783540727385

ISBN - alternative Schreibweisen:
978-3-540-72738-5
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: katz, verlag gmbh, jonathan, schafer
Titel des Buches: applied cryptography, china


Daten vom Verlag:

Autor/in: Jonathan Katz; Moti Yung
Titel: Lecture Notes in Computer Science; Security and Cryptology; Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
Verlag: Springer; Springer Berlin
502 Seiten
Erscheinungsjahr: 2007-06-23
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIV, 502 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; AES; Firewall; PKC; PKI; Signcryption; complexity; cryptanalysis; cryptographic attacks; cryptography; key management; multi-party encryption; network security; networks; privacy; signature; C; Computer Communication Networks; Cryptology; Data and Information Security; Computer and Information Systems Applications; Computers and Society; IT Operations; Computer Science; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Angewandte Informatik; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; BC

Signature Schemes I.- Generic Transformation to Strongly Unforgeable Signatures.- Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.- Merkle Signatures with Virtually Unlimited Signature Capacity.- Computer and Network Security.- Midpoints Versus Endpoints: From Protocols to Firewalls.- An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.- Analyzing an Electronic Cash Protocol Using Applied Pi Calculus.- Cryptanalysis.- Cryptanalysis of the TRMC-4 Public Key Cryptosystem.- Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.- A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA.- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.- Group-Oriented Security.- Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity.- Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.- Bayesian Methods for Practical Traitor Tracing.- Cryptographic Protocols.- A New Protocol for Conditional Disclosure of Secrets and Its Applications.- An Unconditionally Secure Protocol for Multi-Party Set Intersection.- Privacy-Preserving Set Union.- Anonymous Authentication.- Universal Accumulators with Efficient Nonmembership Proofs.- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes.- Identity-Based Cryptography.- Identity-Based Proxy Re-encryption.- A More Natural Way to Construct Identity-Based Identification Schemes.- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.- Certified E-Mail Protocol in the ID-Based Setting.- Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks.- Efficient Content Authentication in Peer-to-Peer Networks.- An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.- Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.- BAP: Broadcast Authentication Using Cryptographic Puzzles.- Efficient Implementation.- Compressed XTR.- Sliding Window Method for NTRU.- Signature Schemes II.- Efficient Certificateless Signature Schemes.- Security Mediated Certificateless Signatures.- Gradually Convertible Undeniable Signatures.

< zum Archiv...