- 5 Ergebnisse
Kleinster Preis: € 77,53, größter Preis: € 96,49, Mittelwert: € 89,21
1
Bestellen
bei lehmanns.de
€ 94,24
Versand: € 0,001
Bestellengesponserter Link
Yongfei Han; Moti Yung; Jianying Zhou:

Applied Cryptography and Network Security - neues Buch

2003, ISBN: 9783540452034

First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, eBooks, eBook Download (PDF), The 1st International Conference on &quote;Applied Cryptogra… Mehr…

Versandkosten:Download sofort lieferbar. (EUR 0.00)
2
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings - Angelo Marcello Anile
Bestellen
bei hive.co.uk
£ 68,85
(ca. € 81,32)
Bestellengesponserter Link

Angelo Marcello Anile:

Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings - neues Buch

2003, ISBN: 9783540452034

The 1st International Conference on "Applied Cryptography and Network Se- rity" (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Ass… Mehr…

No. 9783540452034. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
3
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings - Robeto Moreno Diaz
Bestellen
bei hive.co.uk
£ 68,85
(ca. € 77,53)
Bestellengesponserter Link
Robeto Moreno Diaz:
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings - neues Buch

2003

ISBN: 9783540452034

The 1st International Conference on "Applied Cryptography and Network Se- rity" (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Ass… Mehr…

No. 9783540452034. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
4
Applied Cryptography and Network Security
Bestellen
bei Hugendubel.de
€ 96,49
Versand: € 0,001
Bestellengesponserter Link
Applied Cryptography and Network Security - neues Buch

2003, ISBN: 9783540452034

Applied Cryptography and Network Security ab 96.49 € als pdf eBook: First International Conference ACNS 2003. Kunming China October 16-19 2003 Proceedings. Aus dem Bereich: eBooks, Sachth… Mehr…

Nr. 33541278. Versandkosten:, , DE. (EUR 0.00)
5
Applied Cryptography and Network Security
Bestellen
bei eBook.de
€ 96,49
Versand: € 0,001
Bestellengesponserter Link
Applied Cryptography and Network Security - neues Buch

2003, ISBN: 9783540452034

Applied Cryptography and Network Security - First International Conference ACNS 2003. Kunming China October 16-19 2003 Proceedings: ab 96.49 € Medien > Bücher > E-books, [PU: Springer, Be… Mehr…

Nr. 33541278. Versandkosten:, , DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Applied Cryptography and Network Security


EAN (ISBN-13): 9783540452034
Erscheinungsjahr: 2003
Herausgeber: Springer Berlin Heidelberg

Buch in der Datenbank seit 2017-01-18T16:51:08+01:00 (Berlin)
Detailseite zuletzt geändert am 2023-01-16T03:47:29+01:00 (Berlin)
ISBN/EAN: 9783540452034

ISBN - alternative Schreibweisen:
978-3-540-45203-4
Alternative Schreibweisen und verwandte Suchbegriffe:
Titel des Buches: applied cryptography


Daten vom Verlag:

Autor/in: Jianying Zhou; Moti Yung; Yongfei Han
Titel: Lecture Notes in Computer Science; Applied Cryptography and Network Security - First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings
Verlag: Springer; Springer Berlin
440 Seiten
Erscheinungsjahr: 2003-10-24
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 440 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; applied cryptography; cryptographic attacks; cryptographic protocols; cryptography; internet security; intrusion detection; network security; privacy; public key cryptography; secure communications; secure networking; security; signature schemes; web security; C; Computer Communication Networks; Cryptology; Operating Systems; Computers and Society; IT Operations; Computer Science; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Digital- und Informationstechnologien: soziale und ethische Aspekte; Wirtschaftsmathematik und -informatik, IT-Management; BC

Cryptographic Applications.- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.- Optimized ? 2-Attack against RC6.- Anonymity-Enhanced Pseudonym System.- Intrusion Detection.- Using Feedback to Improve Masquerade Detection.- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.- An IP Traceback Scheme Integrating DPM and PPM.- Cryptographic Algorithms.- Improved Scalable Hash Chain Traversal.- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.- On the Security of Two Threshold Signature Schemes with Traceable Signers.- Digital Signature.- Proxy and Threshold One-Time Signatures.- A Threshold GQ Signature Scheme.- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary.- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.- Security Modelling.- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.- An Authorization Model for E-consent Requirement in a Health Care Application.- PLI: A New Framework to Protect Digital Content for P2P Networks.- Web Security.- Improved Algebraic Traitor Tracing Scheme.- Common Vulnerability Markup Language.- Trust on Web Browser: Attack vs. Defense.- Security Protocols.- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.- Using OCSP to Secure Certificate-Using Transactions in M-commerce.- Cryptanalysis.- Differential Fault Analysis on A.E.S.- Side-Channel Attack on Substitution Blocks.- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.- A Fast Correlation Attack for LFSR-Based Stream Ciphers.- Key Management.- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.- An Efficient Tree-Based Group KeyAgreement Using Bilinear Map.- A Key Recovery Mechanism for Reliable Group Key Management.- Efficient Implementations.- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.- Efficient Distributed Signcryption Scheme as Group Signcryption.- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Includes supplementary material: sn.pub/extras

< zum Archiv...