- 5 Résultats
prix le plus bas: € 30,07, prix le plus élevé: € 94,00, prix moyen: € 65,16
1
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - Andrei Voronkov
Commander
sur hive.co.uk
£ 68,85
(environ € 79,75)
CommanderLien sponsorisé
Andrei Voronkov:

Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - nouveau livre

2001, ISBN: 9783540456001

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.Among the preceding conferences, ICICS'97 was held… Plus…

No. 9783540456001. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise
2
Commander
sur lehmanns.de
€ 94,00
CommanderLien sponsorisé

Tatsuaki Okamoto; Jianying Zhou:

Information and Communications Security - nouveau livre

2003, ISBN: 9783540456001

Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings, eBooks, eBook Download (PDF), ICICS 2001, the Third International Conference on Information and… Plus…

Frais d'envoiDoes not ship to your country., Livraison non-comprise
3
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - C. Guet
Commander
sur hive.co.uk
£ 68,85
(environ € 79,20)
CommanderLien sponsorisé
C. Guet:
Information and Communications Security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings - nouveau livre

2001

ISBN: 9783540456001

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.Among the preceding conferences, ICICS'97 was held… Plus…

No. 9783540456001. Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten., Livraison non-comprise
4
Information and Communications Security
Commander
sur Springer.com
€ 42,79
Envoi: € 0,001
CommanderLien sponsorisé
Information and Communications Security - nouveau livre

2001, ISBN: 9783540456001

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was hel… Plus…

Nr. 978-3-540-45600-1. Frais d'envoiWorldwide free shipping, , DE. (EUR 0.00)
5
Information and Communications Security - 1st Edition (eBook Rental)
Commander
sur VitalSource.com
$ 35,70
(environ € 30,07)
CommanderLien sponsorisé
Information and Communications Security - 1st Edition (eBook Rental) - nouveau livre

ISBN: 9783540456001

1st Edition, by Yongfei Han; Tatsuaki Okamoto; Sihan Quing, PRINT ISBN: 9783540428800 E-TEXT ISBN: 9783540456001 Springer Nature eBook Other pricing structure might be available at vitals… Plus…

new in stock United States. Frais d'envoiplus shipping costs., Livraison non-comprise

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre

Informations détaillées sur le livre - Information and Communications Security


EAN (ISBN-13): 9783540456001
Date de parution: 2001
Editeur: Springer Berlin Heidelberg

Livre dans la base de données depuis 2017-04-25T08:27:19+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-03-30T07:56:20+01:00 (Paris)
ISBN/EAN: 9783540456001

ISBN - Autres types d'écriture:
978-3-540-45600-1
Autres types d'écriture et termes associés:
Auteur du livre: tolle
Titre du livre: november 2001


Données de l'éditeur

Auteur: Tatsuaki Okamoto; Jianying Zhou
Titre: Lecture Notes in Computer Science; Information and Communications Security - Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Proceedings
Editeur: Springer; Springer Berlin
510 Pages
Date de parution: 2003-06-30
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIV, 510 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Authentication; Boolean function; Code; Computational Algebra; Cryptographic Algorithms; Data Security; Digital Communication; Digital Signature Schemes; Error-correcting Code; Information; Information Security; Internet Security; Routing; communication; finite field; algorithm analysis and problem complexity; C; Cryptology; Computer Communication Networks; Operating Systems; Algorithms; IT Operations; IT in Business; Computer Science; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Betriebssysteme; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Unternehmensanwendungen; BC

Security of Blind Discrete Log Signatures against Interactive Attacks.- An Intelligent Intruder Model for Security Protocol Analysis.- Primitive Polynomials over GF(2) — A Cryptologic Approach.- Unconditionally-Secure Oblivious Transfer.- Cryptanalysis of the Improved User Efficient Blind Signatures.- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain.- A Cyclic Window Algorithm for ECC Defined over Extension Fields.- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes.- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce.- A New Approach for Secure Multicast Routing in a Large Scale Network.- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems.- Dealing with Uncertainties in Risk Analysis Using Belief Functions.- RBAC for XML Document Stores.- Cheating Immune Secret Sharing.- Encryption Sticks (Randomats).- Applying NCP Logic to the Analysis of SSL 3.0.- Performance of WTLS and Its Impact on an M-commerce Transaction.- Enforcing Obligation with Security Monitors.- Efficient Software Implementation for Finite Field Multiplication in Normal Basis.- Playing Lottery on the Internet.- Privacy Protection for Transactions of Digital Goods.- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions.- Threshold Undeniable RSA Signature Scheme.- Two Simple Batch Verifying Multiple Digital Signatures.- Square Attack on Reduced Camellia Cipher.- Generalization of Elliptic Curve Digital Signature Schemes.- Reasoning aboutAccountability within Delegation.- A Novel Data Hiding Method for Two-Color Images.- An Identification Scheme Provably Secure against Reset Attack.- Estimating the Scalability of the Internet Key Exchange.- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.- Defeating Denial-of-Service Attacks on the Internet.- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications.- A Unified Methodology for Verification and Synthesis of Firewall Configurations.- Quantifying Network Denial of Service: A Location Service Case Study.- A Public Key Cryptosystem Based on the Subgroup Membership Problem.- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network.- NIDS Research Based on Artificial Immunology.- AMBAR Protocol: Access Management Based on Authorization Reduction.- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.- Dispatching Mobile Agents with Secure Routes in Parallel.- TH-SMS: Security Management System in Advanced Computational Infrastructure.- Cryptography and Middleware Security.- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes.- A Role-Based Model for Access Control in Database Federations.- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls.- A Digital Nominative Proxy Signature Scheme for Mobile Communication.- Hierarchical Simulation Model with Animation for Large Network Security.- Fair Electronic Cash Based on a Group Signature Scheme.- Fair Exchange of Digital Signatures with Offline Trusted Third Party.- SECUSIM: A Tool for the Cyber-Attack Simulation.- A New Semantics of Authentication Logic.- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles.- Redundancy, Obscurity, Self-Containment & Independence.
Includes supplementary material: sn.pub/extras

< pour archiver...