2007, ISBN: 9783540770473
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The … Mehr…
BetterWorldBooks.com used in stock. Versandkosten:zzgl. Versandkosten. Details... |
2007, ISBN: 9783540770473
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The … Mehr…
Indigo.ca new in stock. Versandkosten:zzgl. Versandkosten. Details... |
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings 2007 - gebrauchtes Buch
2007, ISBN: 9783540770473
2007 Gepflegter, sauberer Zustand. 4066833/2 Versandkostenfreie Lieferung access control,communication,security,cryptographic protocols,malware,information,AES,DoS attacks,cryptanalysis,n… Mehr…
buchfreund.de |
Introduction to Financial Accounting (6th ed) (Prentice Hall Series in Accounting) - gebunden oder broschiert
1995, ISBN: 9783540770473
Pearson, Gebundene Ausgabe, Auflage: 6th, 819 Seiten, Publiziert: 1995-12T, Produktgruppe: Buch, 3.71 kg, Verkaufsrang: 1823, Finanzbuchhaltung, Bilanzierung & Buchhaltung, Business & Kar… Mehr…
amazon.de BEANNY Gut Versandkosten:Gewöhnlich versandfertig in 3 bis 5 Wochen. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Introduction to Financial Accounting (6th ed) (Prentice Hall Series in Accounting) - gebunden oder broschiert
1995, ISBN: 9783540770473
Pearson, Gebundene Ausgabe, Auflage: 6th, 819 Seiten, Publiziert: 1995-12T, Produktgruppe: Buch, 3.71 kg, Verkaufsrang: 1823, Finanzbuchhaltung, Bilanzierung & Buchhaltung, Business & Kar… Mehr…
amazon.de Delhi_Book_Store Versandkosten:Auf Lager. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
Information and Communications Security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings - gebrauchtes Buch
2007, ISBN: 9783540770473
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The … Mehr…
2007, ISBN: 9783540770473
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The … Mehr…
Information and Communications Security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings 2007 - gebrauchtes Buch
2007
ISBN: 9783540770473
2007 Gepflegter, sauberer Zustand. 4066833/2 Versandkostenfreie Lieferung access control,communication,security,cryptographic protocols,malware,information,AES,DoS attacks,cryptanalysis,n… Mehr…
Introduction to Financial Accounting (6th ed) (Prentice Hall Series in Accounting) - gebunden oder broschiert
1995, ISBN: 9783540770473
Pearson, Gebundene Ausgabe, Auflage: 6th, 819 Seiten, Publiziert: 1995-12T, Produktgruppe: Buch, 3.71 kg, Verkaufsrang: 1823, Finanzbuchhaltung, Bilanzierung & Buchhaltung, Business & Kar… Mehr…
Introduction to Financial Accounting (6th ed) (Prentice Hall Series in Accounting) - gebunden oder broschiert
1995, ISBN: 9783540770473
Pearson, Gebundene Ausgabe, Auflage: 6th, 819 Seiten, Publiziert: 1995-12T, Produktgruppe: Buch, 3.71 kg, Verkaufsrang: 1823, Finanzbuchhaltung, Bilanzierung & Buchhaltung, Business & Kar… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceed
EAN (ISBN-13): 9783540770473
ISBN (ISBN-10): 354077047X
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2007
Herausgeber: Pearson
508 Seiten
Gewicht: 0,787 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-01-25T11:30:37+01:00 (Berlin)
Detailseite zuletzt geändert am 2023-06-29T14:20:42+02:00 (Berlin)
ISBN/EAN: 9783540770473
ISBN - alternative Schreibweisen:
3-540-77047-X, 978-3-540-77047-3
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: imai, qin wang, qing, proceedings, horngren, hideki, john elliott
Titel des Buches: information security, xii international conference, conference proceedings communications, conferences proceedings
Daten vom Verlag:
Autor/in: Hideki Imai; Guilin Wang
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings
Verlag: Springer; Springer Berlin
514 Seiten
Erscheinungsjahr: 2007-11-29
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 514 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; DoS attacks; access control; communication; cryptanalysis; cryptographic protocols; cryptography; digital watermark; information; information security; malware; network sec; network security; security; algorithm analysis and problem complexity; Cryptology; Computer Communication Networks; Data and Information Security; IT Operations; Computers and Society; Algorithms; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Algorithmen und Datenstrukturen; EA
Authentication and Key Exchange.- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.- New Construction of Group Secret Handshakes Based on Pairings.- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.- An Efficient Password-Only Two-Server Authenticated Key Exchange System.- Digital Signatures.- Formal Definition and Construction of Nominative Signature.- Short Group Signature Without Random Oracles.- (Convertible) Undeniable Signatures Without Random Oracles.- Applications.- A New Dynamic Accumulator for Batch Updates.- Preventing Unofficial Information Propagation.- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction.- Privacy Protection on Multiple Sensitive Attributes.- Watermarking.- Audio Watermarking Algorithm Based on Centroid and Statistical Features.- A Semi-blind Watermarking Based on Discrete Wavelet Transform.- Fast Implementations.- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme.- High Speed Modular Divider Based on GCD Algorithm.- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set.- Compact and Secure Design of Masked AES S-Box.- Applied Cryptography.- Boudot’s Range-Bounded Commitment Scheme Revisited.- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.- Secure Multiparty Computation of DNF.- Cryptanalysis.- Square Like Attack on Camellia.- Differential Fault Analysis on CLEFIA.- Extending FORK-256 Attack to the Full Hash Function.- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard.- Formal Analysis.- A Framework for Game-Based Security Proofs.- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security.- Modeling Agreement Problems in the Universal Composability Framework.- System Security I.- A System Architecture for History-Based Access Control for XML Documents.- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing.- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.- System Security II.- A Novel Approach for Untrusted Code Execution.- Detection and Diagnosis of Control Interception.- BIOS Security Analysis and a Kind of Trusted BIOS.- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.- Network Security.- DDoS Attack Detection Algorithms Based on Entropy Computing.- Firewall for Dynamic IP Address in Mobile IPv6.- Application of the PageRank Algorithm to Alarm Graphs.- Drive-By Pharming.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783540636960 Information and Communications Security (Han Yongfei/ Tatsuaki Okamoto/ Quing Sihan)
- 9783540428800 Information and Communications Security: Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceeding (Tatsuaki Okamoto; Jianying Zhou)
- Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Lecture Notes in Computer Science) (2008-06-13) (Dennis Beck, Anasol Peña-Rios, Todd Ogle, Daphne Economou, Markos Mentzelopoulos, Leonel Morgado, Christian Eckhardt, Johanna Pirker, Roxane Koitz-Hristov, Jonathon Richter, Christian Gütl, Michael Gardner)
< zum Archiv...