Information Security First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings - nouveau livre
1998, ISBN: 3540643826
1998 Kartoniert / Broschiert Algorithmus, Betriebssystem (EDV), Operating System, Datenverarbeitung / Datenverschlüsselung, Kryptografie, Mathematik, Netzwerk (elektronisch), Netzwerk-H… Plus…
Achtung-Buecher.de MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Frais d'envoiVersandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
1998, ISBN: 3540643826
[EAN: 9783540643821], Gebraucht, sehr guter Zustand, [SC: 3.5], [PU: Springer], SICHERHEIT / COMPUTER & INTERNET INFORMATIK NATURWISSENSCHAFTEN TECHNIK HARDWARE, 364 Seiten Gepflegtes ehe… Plus…
ZVAB.com getbooks GmbH, Bad Camberg, HE, Germany [55883480] [Rating: 5 (von 5)] NOT NEW BOOK. Frais d'envoi EUR 3.50 Details... |
ISBN: 9783540643821
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in Septem… Plus…
Springer.com Nr. 978-3-540-64382-1. Frais d'envoiWorldwide free shipping, , DE. (EUR 0.00) Details... |
Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings (Lecture Notes in Computer Science) - Livres de poche
1997, ISBN: 9783540643821
Springer, 1998-04-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Text block clean and unmarked. Tight binding., Springer,… Plus…
Biblio.co.uk |
Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings (Lecture Notes in Computer Science) - Livres de poche
1997, ISBN: 9783540643821
Springer, 1998-05-22. Paperback. Used: Good., Springer, 1998-05-22, 2.5
Biblio.co.uk |
Information Security First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings - nouveau livre
1998, ISBN: 3540643826
1998 Kartoniert / Broschiert Algorithmus, Betriebssystem (EDV), Operating System, Datenverarbeitung / Datenverschlüsselung, Kryptografie, Mathematik, Netzwerk (elektronisch), Netzwerk-H… Plus…
1998, ISBN: 3540643826
[EAN: 9783540643821], Gebraucht, sehr guter Zustand, [SC: 3.5], [PU: Springer], SICHERHEIT / COMPUTER & INTERNET INFORMATIK NATURWISSENSCHAFTEN TECHNIK HARDWARE, 364 Seiten Gepflegtes ehe… Plus…
ISBN: 9783540643821
This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Security, ISW'98, held in Tatsunokuchi, Ishikawa, Japan, in Septem… Plus…
Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings (Lecture Notes in Computer Science) - Livres de poche
1997, ISBN: 9783540643821
Springer, 1998-04-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Text block clean and unmarked. Tight binding., Springer,… Plus…
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Information Security: First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedi
EAN (ISBN-13): 9783540643821
ISBN (ISBN-10): 3540643826
Version reliée
Livre de poche
Date de parution: 1998
Editeur: Springer Berlin
376 Pages
Poids: 0,567 kg
Langue: eng/Englisch
Livre dans la base de données depuis 2007-03-24T17:43:42+01:00 (Paris)
Page de détail modifiée en dernier sur 2023-11-26T12:44:42+01:00 (Paris)
ISBN/EAN: 9783540643821
ISBN - Autres types d'écriture:
3-540-64382-6, 978-3-540-64382-1
Autres types d'écriture et termes associés:
Auteur du livre: davida, okamoto, masahiro, eiji, ishikawa, george
Titre du livre: information, computer security, japan computer, security first, international 1997, lecture notes computer science, proceedings international workshop
Données de l'éditeur
Auteur: Eiji Okamoto; George Davida; Masahiro Mambo
Titre: Lecture Notes in Computer Science; Information Security - First International Workshop, ISW'97, Tatsunokuchi, Ishikawa Japan, September 17-19, 1997, Proceedings
Editeur: Springer; Springer Berlin
364 Pages
Date de parution: 1998-04-08
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 364 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Algorithms; Automat; Hardware; Public Key; Smart Card; automata; communication; cryptography; data security; information; operating system; privacy; real-time; security; algorithm analysis and problem complexity; Cryptology; Data and Information Security; Algorithms; Computer Communication Networks; Operating Systems; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Algorithmen und Datenstrukturen; Netzwerk-Hardware; Betriebssysteme; EA
A general theory of codes, II: Paradigms and homomorphisms.- Improving the higher order differential attack and cryptanalysis of the KN cipher.- An optimised linear attack on pseudorandom generators using a non-linear combiner.- Cryptanalysis of message authentication codes.- The least witness of a composite number.- Fast algorithm for finding a small root of a quadratic modular equation.- Modified Finite Automata Public Key Cryptosystem.- Modified ElGamal cryptosystem.- Remarks on blind decryption.- High-speed cryptography.- Secure applications of low-entropy keys.- A key escrow system of the RSA cryptosystem.- A key escrow system with protecting user's privacy by blind decoding.- Some recent research aspects of threshold cryptography.- A high-speed small RSA encryption LSI with low power dissipation.- The case for a secure multi-application smart card operating system.- An augmented family of cryptographic Parity Circuits.- A new byte-oriented block cipher.- Practice-oriented provable-security.- A framework for the management of information security.- Specifying security in a composite system.- On rough sets and inference analysis.- Arbitrated unconditionally secure authentication scheme with multi-senders.- Group signatures for hierarchical multigroups.- Threshold proxy signature schemes.- Signcryption and its applications in efficient public key solutions.- A new digital cash scheme based on blind Nyberg-Rueppel digital signature.- An incremental payment method for internet based streaming real-time media.- A new identity-based key exchange protocol minimizing computation and communication.- The application of ID-based key distribution systems to an elliptic curve.- On reconciliation of discrepant sequences shared through quantum mechanical channels.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9781259098345 Information Security The Complete Reference (Second Edition) (Mark Rhodes-Ousley)
< pour archiver...