Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - nouveau livre
2001, ISBN: 9783540456001
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.Among the preceding conferences, ICICS'97 was held… Plus…
hive.co.uk No. 9783540456001. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise Details... |
2003, ISBN: 9783540456001
Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings, eBooks, eBook Download (PDF), ICICS 2001, the Third International Conference on Information and… Plus…
lehmanns.de Frais d'envoiDoes not ship to your country., Livraison non-comprise Details... |
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - nouveau livre
2001, ISBN: 9783540456001
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.Among the preceding conferences, ICICS'97 was held… Plus…
hive.co.uk No. 9783540456001. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise Details... |
2001, ISBN: 9783540456001
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was hel… Plus…
Springer.com Nr. 978-3-540-45600-1. Frais d'envoiWorldwide free shipping, , DE. (EUR 0.00) Details... |
ISBN: 9783540456001
1st Edition, by Yongfei Han; Tatsuaki Okamoto; Sihan Quing, PRINT ISBN: 9783540428800 E-TEXT ISBN: 9783540456001 Springer Nature eBook Other pricing structure might be available at vitals… Plus…
VitalSource.com new in stock United States. Frais d'envoiplus shipping costs., Livraison non-comprise Details... |
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - nouveau livre
2001, ISBN: 9783540456001
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.Among the preceding conferences, ICICS'97 was held… Plus…
2003, ISBN: 9783540456001
Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings, eBooks, eBook Download (PDF), ICICS 2001, the Third International Conference on Information and… Plus…
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - nouveau livre
2001
ISBN: 9783540456001
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.Among the preceding conferences, ICICS'97 was held… Plus…
2001, ISBN: 9783540456001
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was hel… Plus…
ISBN: 9783540456001
1st Edition, by Yongfei Han; Tatsuaki Okamoto; Sihan Quing, PRINT ISBN: 9783540428800 E-TEXT ISBN: 9783540456001 Springer Nature eBook Other pricing structure might be available at vitals… Plus…
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Information and Communications Security
EAN (ISBN-13): 9783540456001
Date de parution: 2001
Editeur: Springer Berlin Heidelberg
Livre dans la base de données depuis 2017-04-25T08:27:19+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-03-30T07:56:20+01:00 (Paris)
ISBN/EAN: 9783540456001
ISBN - Autres types d'écriture:
978-3-540-45600-1
Autres types d'écriture et termes associés:
Auteur du livre: tolle
Titre du livre: november 2001
Données de l'éditeur
Auteur: Tatsuaki Okamoto; Jianying Zhou
Titre: Lecture Notes in Computer Science; Information and Communications Security - Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings
Editeur: Springer; Springer Berlin
510 Pages
Date de parution: 2003-06-30
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIV, 510 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Authentication; Boolean function; Code; Computational Algebra; Cryptographic Algorithms; Data Security; Digital Communication; Digital Signature Schemes; Error-correcting Code; Information; Information Security; Internet Security; Routing; communication; finite field; algorithm analysis and problem complexity; C; Cryptology; Computer Communication Networks; Operating Systems; Algorithms; IT Operations; IT in Business; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Unternehmensanwendungen; BC
Security of Blind Discrete Log Signatures against Interactive Attacks.- An Intelligent Intruder Model for Security Protocol Analysis.- Primitive Polynomials over GF(2) — A Cryptologic Approach.- Unconditionally-Secure Oblivious Transfer.- Cryptanalysis of the Improved User Efficient Blind Signatures.- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain.- A Cyclic Window Algorithm for ECC Defined over Extension Fields.- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes.- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce.- A New Approach for Secure Multicast Routing in a Large Scale Network.- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems.- Dealing with Uncertainties in Risk Analysis Using Belief Functions.- RBAC for XML Document Stores.- Cheating Immune Secret Sharing.- Encryption Sticks (Randomats).- Applying NCP Logic to the Analysis of SSL 3.0.- Performance of WTLS and Its Impact on an M-commerce Transaction.- Enforcing Obligation with Security Monitors.- Efficient Software Implementation for Finite Field Multiplication in Normal Basis.- Playing Lottery on the Internet.- Privacy Protection for Transactions of Digital Goods.- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions.- Threshold Undeniable RSA Signature Scheme.- Two Simple Batch Verifying Multiple Digital Signatures.- Square Attack on Reduced Camellia Cipher.- Generalization of Elliptic Curve Digital Signature Schemes.- Reasoning aboutAccountability within Delegation.- A Novel Data Hiding Method for Two-Color Images.- An Identification Scheme Provably Secure against Reset Attack.- Estimating the Scalability of the Internet Key Exchange.- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.- Defeating Denial-of-Service Attacks on the Internet.- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications.- A Unified Methodology for Verification and Synthesis of Firewall Configurations.- Quantifying Network Denial of Service: A Location Service Case Study.- A Public Key Cryptosystem Based on the Subgroup Membership Problem.- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network.- NIDS Research Based on Artificial Immunology.- AMBAR Protocol: Access Management Based on Authorization Reduction.- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.- Dispatching Mobile Agents with Secure Routes in Parallel.- TH-SMS: Security Management System in Advanced Computational Infrastructure.- Cryptography and Middleware Security.- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes.- A Role-Based Model for Access Control in Database Federations.- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls.- A Digital Nominative Proxy Signature Scheme for Mobile Communication.- Hierarchical Simulation Model with Animation for Large Network Security.- Fair Electronic Cash Based on a Group Signature Scheme.- Fair Exchange of Digital Signatures with Offline Trusted Third Party.- SECUSIM: A Tool for the Cyber-Attack Simulation.- A New Semantics of Authentication Logic.- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles.- Redundancy, Obscurity, Self-Containment & Independence.Includes supplementary material: sn.pub/extras
Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783030019495 Information And Communications Security: 20th International Conference, Icics 2018, Lille, France, October 29-31, 2018, Proceeding (David Naccache; Shouhuai Xu; Sihan Qing; Pierangela Samarati; Gregory Blanc; Rongxing Lu; Zonghua Zhang; Ahmed Meddahi)
- 9783540636960 Information and Communications Security (Han Yongfei/ Tatsuaki Okamoto/ Quing Sihan)
- 9783540428800 Information and Communications Security: Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceeding (Tatsuaki Okamoto; Jianying Zhou)
- Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings (Lecture Notes in Computer Science) (2008-06-13) (Dennis Beck, Anasol Peña-Rios, Todd Ogle, Daphne Economou, Markos Mentzelopoulos, Leonel Morgado, Christian Eckhardt, Johanna Pirker, Roxane Koitz-Hristov, Jonathon Richter, Christian Gütl, Michael Gardner)
< pour archiver...