2007, ISBN: 9783540734574
Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and o… Mehr…
Springer.com new in stock. Versandkosten:plus shipping costs., zzgl. Versandkosten Details... |
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Josef Pieprzyk (u. a.) Taschenbuch Pb Englisch 2007 - Taschenbuch
2007, ISBN: 9783540734574
[ED: Taschenbuch], [PU: Springer Berlin], Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12… Mehr…
booklooker.de |
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Taschenbuch
2007, ISBN: 9783540734574
Springer, 2007-08-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-08-08, 3
Biblio.co.uk |
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2007
lehmanns.de Versandkosten:Versand in 10-14 Tagen. (EUR 9.95) Details... |
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, 2007, Softcover, Buch, [PU: Springer Berlin]
lehmanns.de Versandkosten:sofort lieferbar, , Sans frais d'envoi en Allemagne. (EUR 9.95) Details... |
2007, ISBN: 9783540734574
Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and o… Mehr…
Pieprzyk, Josef:
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Josef Pieprzyk (u. a.) Taschenbuch Pb Englisch 2007 - Taschenbuch2007, ISBN: 9783540734574
[ED: Taschenbuch], [PU: Springer Berlin], Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12… Mehr…
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Taschenbuch
2007
ISBN: 9783540734574
Springer, 2007-08-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-08-08, 3
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2007
2007, ISBN: 9783540734574
12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, 2007, Softcover, Buch, [PU: Springer Berlin]
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Privacy
EAN (ISBN-13): 9783540734574
ISBN (ISBN-10): 3540734570
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2007
Herausgeber: Springer Berlin
476 Seiten
Gewicht: 0,744 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-01-09T10:03:59+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-02-19T21:03:01+01:00 (Berlin)
ISBN/EAN: 9783540734574
ISBN - alternative Schreibweisen:
3-540-73457-0, 978-3-540-73457-4
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: hossein, dawson, josef six, held josef
Titel des Buches: privacy, information security, australasian science, australia our, computer security
Daten vom Verlag:
Autor/in: Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Verlag: Springer; Springer Berlin
476 Seiten
Erscheinungsjahr: 2007-06-15
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 476 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Signatur; anonymity; authentication; bilinear pairings; biometrics; block ciphers; communication; cryptanalysis; cryptographic attacks; cryptographic hash function; data security; networks; privacy; security; algorithm analysis and problem complexity; Cryptology; IT Operations; Data and Information Security; Computer Communication Networks; Coding and Information Theory; Algorithms; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Informationstheorie; Algorithmen und Datenstrukturen; EA
Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier’s Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- “Sandwich”Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030215477 Information Security and Privacy (Julian Jang-Jaccard; Fuchun Guo)
- 9783030215477 Information Security and Privacy (Julian Jang-Jaccard; Fuchun Guo)
- 9783030215484 Information Security and Privacy (Fuchun Guo; Julian Jang-Jaccard)
- 9780314801111 Information Security and Privacy: A Guide to Federal and State Law and Compliance, 2013 ed.. (Andrew Serwin)
- 9780314603128 Information Security and Privacy: A Guide to Federal and State Law and Compliance (Andrew B. Serwin)
- 9780314610768 Information Security and Privacy 2013: A Guide to Federal and State Law and Compliance (Andrew B. Serwin)
< zum Archiv...