- 0 Ergebnisse
Kleinster Preis: € 104,04, größter Preis: € 125,93, Mittelwert: € 116,47
1
Security and Privacy in Communication Networks - Springer Berlin
Bestellen
bei Orellfuessli.ch
CHF 122,00
(ca. € 117,00)
Versand: € 17,261
Bestellen
gesponserter Link
Springer Berlin:

Security and Privacy in Communication Networks - Taschenbuch

2010, ISBN: 9783642161605

These proceedings contain the papers selected for presentation at the 6th - ternational Conference on Security and Privacy in Communication Networks - SecureComm 2010 - held on September … Mehr…

Nr. 23957254. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 1 - 2 Werktagen, zzgl. Versandkosten. (EUR 17.26)
2
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50)
Bestellen
bei Amazon.de (Intern. Bücher)
€ 117,69
Versand: € 3,001
Bestellen
gesponserter Link
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50) - Taschenbuch

2010, ISBN: 9783642161605

Series Editor: Zhou, Jianying, Springer, Taschenbuch, Auflage: 2010, 516 Seiten, Publiziert: 2010-11-04T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 31559877, 1.73 kg, Informationsmana… Mehr…

Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00)
3
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50)
Bestellen
bei Amazon.de (Intern. Bücher)
€ 125,93
Versand: € 0,001
Bestellen
gesponserter Link
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50) - Taschenbuch

2010

ISBN: 9783642161605

Series Editor: Zhou, Jianying, Springer, Taschenbuch, Auflage: 2010, 516 Seiten, Publiziert: 2010-11-04T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 31559877, 1.73 kg, Informationsmana… Mehr…

Versandkosten:Auf Lager. Lieferung von Amazon. (EUR 0.00) Amazon.de
4
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50)
Bestellen
bei Amazon.de (Intern. Bücher)
€ 104,04
Versand: € 3,001
Bestellen
gesponserter Link
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50) - Taschenbuch

2010, ISBN: 9783642161605

Series Editor: Zhou, Jianying, Springer, Taschenbuch, Auflage: 2010, 516 Seiten, Publiziert: 2010-11-04T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 31559877, 1.73 kg, Informationsmana… Mehr…

Versandkosten:Auf Lager. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) ausverkauf
5
Security and Privacy in Communication Networks - Sushil Jajodia; Jianying Zhou
Bestellen
bei lehmanns.de
€ 117,69
Versand: € 0,001
Bestellen
gesponserter Link
Sushil Jajodia; Jianying Zhou:
Security and Privacy in Communication Networks - Taschenbuch

2010, ISBN: 9783642161605

6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010

Versandkosten:sofort lieferbar. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.
Details zum Buch
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50)

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security protocols.

Detailangaben zum Buch - Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... Telecommunications Engineering, 50, Band 50)


EAN (ISBN-13): 9783642161605
ISBN (ISBN-10): 364216160X
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2010
Herausgeber: Jajodia, Sushil, Springer
500 Seiten
Gewicht: 0,782 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2008-05-22T09:10:13+02:00 (Berlin)
Detailseite zuletzt geändert am 2022-01-21T10:27:51+01:00 (Berlin)
ISBN/EAN: 9783642161605

ISBN - alternative Schreibweisen:
3-642-16160-X, 978-3-642-16160-5


Daten vom Verlag:

Autor/in: Sushil Jajodia; Jianying Zhou
Titel: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks - 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings
Verlag: Springer; Springer Berlin
500 Seiten
Erscheinungsjahr: 2010-09-03
Berlin; Heidelberg; DE
Gewicht: 0,783 kg
Sprache: Englisch
117,69 € (DE)
120,99 € (AT)
124,12 CHF (CH)
POD
XIII, 500 p. 160 illus.

BC; Book; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; Broadcast; Host; Internet; Online; Overlay; Protection; Quorum; anonoymity; denial of service; email security; embedded systems; network security; privacy; spam; wireless security; algorithm analysis and problem complexity; C; Computer Communication Networks; Management of Computing and Information Systems; Cryptology; Software Engineering; Algorithm Analysis and Problem Complexity; Operating Systems; Computer Communication Networks; IT Operations; Cryptology; Software Engineering; Algorithms; Operating Systems; Computer Science; Wirtschaftsmathematik und -informatik, IT-Management; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Software Engineering; Algorithmen und Datenstrukturen; Betriebssysteme; EA

Malware and Email Security.- SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.- Analyzing and Exploiting Network Behaviors of Malware.- Inexpensive Email Addresses An Email Spam-Combating System.- Anonymity and Privacy.- Privacy Administration in Distributed Service Infrastructure.- On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.- Wireless Security.- A Study on False Channel Condition Reporting Attacks in Wireless Networks.- Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services.- Saving Energy on WiFi with Required IPsec.- Systems Security – I.- Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.- A Generic Construction of Dynamic Single Sign-on with Strong Security.- DeCore: Detecting Content Repurposing Attacks on Clients’ Systems.- Network Security – I.- Realizing a Source Authentic Internet.- Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks.- Attacking Beacon-Enabled 802.15.4 Networks.- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.- Security Protocols – I.- CED2: Communication Efficient Disjointness Decision.- Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes.- Context-Aware Usage Control for Android.- System Security – II.- Efficient Isolation of Trusted Subsystems in Embedded Systems.- Enhancing Host Security Using External Environment Sensors.- FADE: Secure Overlay Cloud Storage with File Assured Deletion.- Security Protocols – II.- A New Information Leakage Measure for Anonymity Protocols.- Hidden Markov Models for Automated Protocol Learning.- Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast.- Network Security – II.- Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly.- The Hitchhiker’s Guide to DNS Cache Poisoning.- A Formal Definition of Online Abuse-Freeness.

< zum Archiv...