- 5 Résultats
prix le plus bas: € 30,82, prix le plus élevé: € 54,99, prix moyen: € 49,26
1
Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Kiwook So
Commander
sur BarnesandNoble.com
€ 54,99
CommanderLien sponsorisé

Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Kiwook So - nouveau livre

2008, ISBN: 9783642003059

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Plus…

new in stock. Frais d'envoizzgl. Versandkosten., Livraison non-comprise
2
Information Security Applications
Commander
sur Springer.com
€ 53,49
Envoi: € 0,001
CommanderLien sponsorisé
Information Security Applications - nouveau livre

2008, ISBN: 9783642003059

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, du… Plus…

Nr. 978-3-642-00305-9. Frais d'envoiWorldwide free shipping, , DE. (EUR 0.00)
3
Information Security Applications
Commander
sur Hugendubel.de
€ 53,49
Envoi: € 0,001
CommanderLien sponsorisé
Information Security Applications - Livres de poche

2009

ISBN: 9783642003059

*Information Security Applications* - 9th International Workshop WISA 2008 Jeju Island Korea September 23-25 2008 Revised Selected Papers. Auflage 2009 / Taschenbuch für 53.49 € / Aus dem… Plus…

Frais d'envoiShipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
4
Information Security Applications
Commander
sur Hugendubel.de
€ 53,49
Envoi: € 0,001
CommanderLien sponsorisé
Information Security Applications - Livres de poche

2009, ISBN: 9783642003059

*Information Security Applications* - 9th International Workshop WISA 2008 Jeju Island Korea September 23-25 2008 Revised Selected Papers. Auflage 2009 / Taschenbuch für 53.49 € / Aus dem… Plus…

Frais d'envoiShipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
5
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers - Sohn, Kiwook und Moti Yung
Commander
sur booklooker.de
€ 30,82
Envoi: € 0,001
CommanderLien sponsorisé
Sohn, Kiwook und Moti Yung:
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers - livre d'occasion

2009, ISBN: 9783642003059

[PU: Springer Berlin], Neubindung, Buchumschlag leicht geknickt, Buchrücken fehlerhaft geklebt, Auflage 2009 5039109/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2009, B… Plus…

Frais d'envoiVersandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchpark GmbH

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre
Information Security Applications

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.

Informations détaillées sur le livre - Information Security Applications


EAN (ISBN-13): 9783642003059
ISBN (ISBN-10): 3642003052
Version reliée
Livre de poche
Date de parution: 2009
Editeur: Springer Berlin Heidelberg
334 Pages
Poids: 0,532 kg
Langue: eng/Englisch

Livre dans la base de données depuis 2008-11-19T05:49:17+01:00 (Paris)
Page de détail modifiée en dernier sur 2024-04-18T23:51:18+02:00 (Paris)
ISBN/EAN: 9783642003059

ISBN - Autres types d'écriture:
3-642-00305-2, 978-3-642-00305-9
Autres types d'écriture et termes associés:
Auteur du livre: chung, sohn, söhn, yung
Titre du livre: island 2008, selected papers, information security, going out korea, whither korea, september island


Données de l'éditeur

Auteur: Kiwook Sohn; Moti Yung
Titre: Lecture Notes in Computer Science; Security and Cryptology; Information Security Applications - 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
Editeur: Springer; Springer Berlin
334 Pages
Date de parution: 2009-02-13
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XI, 334 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Broadcast; Protection; access control; anonymity; authentication; bilinear pairing; block ciphers; broadcast encryption; certificate-based; cryptanalysis; cryptographic hardware; cryptographic protocols; digital forensic; security; algorithm analysis and problem complexity; Cryptology; Data and Information Security; Computer Communication Networks; Algorithms; IT Operations; Special Purpose and Application-Based Systems; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Wissensbasierte Systeme, Expertensysteme; EA

Smart Card and Secure Hardware(1).- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation.- Template Attacks on ECDSA.- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool.- Wireless and Sensor Network Security(1).- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network.- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.- Securing Layer-2 Path Selection in Wireless Mesh Networks.- Public Key Crypto Applications.- Public Key Authentication with Memory Tokens.- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.- Privacy and Anonymity.- Sanitizable and Deletable Signature.- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.- N/W Security and Intrusion Detection.- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512.- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.- Application Security and Trust Management.- Image-Feature Based Human Identification Protocols on Limited Display Devices.- Ternary Subset Difference Method and Its Quantitative Analysis.- Data Deletion with Provable Security.- Smart Card and Secure Hardware(2).- A Probing Attack on AES.- On Avoiding ZVP-Attacks Using Isogeny Volcanoes.- Security Analysisof DRBG Using HMAC in NIST SP 800-90.- Wireless and Sensor Network Security(2).- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.- An Improved Distributed Key Management Scheme in Wireless Sensor Networks.- Protection Profile for Connected Interoperable DRM Framework.

< pour archiver...