- 5 Risultati
prezzo più basso: € 2,78, prezzo più alto: € 101,64, prezzo medio: € 64,32
1
Information Security and Privacy - Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Ordina
da Springer.com
£ 84,99
(indicativi € 97,63)
OrdinaLink sponsorizzato
Josef Pieprzyk; Hossein Ghodosi; Ed Dawson:

Information Security and Privacy - edizione con copertina flessibile

2007, ISBN: 9783540734574

Here is a highly relevant book that covers a wide array of key aspects in information security. With numerous scares in recent months over the way information is stored and handled, and o… Altro …

new in stock. Costi di spedizione:plus shipping costs., Costi di spedizione aggiuntivi
2
Information Security and Privacy  12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings  Josef Pieprzyk (u. a.)  Taschenbuch  Pb  Englisch  2007 - Pieprzyk, Josef
Ordina
da booklooker.de
€ 17,90
Spedizione: € 2,901
OrdinaLink sponsorizzato

Pieprzyk, Josef:

Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Josef Pieprzyk (u. a.) Taschenbuch Pb Englisch 2007 - edizione con copertina flessibile

2007, ISBN: 9783540734574

[ED: Taschenbuch], [PU: Springer Berlin], Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12… Altro …

Costi di spedizione:Versand nach Deutschland. (EUR 2.90) Buchbär
3
Ordina
da Biblio.co.uk
$ 2,99
(indicativi € 2,78)
Spedizione: € 5,561
OrdinaLink sponsorizzato
Pieprzyk, Josef [Editor]; Ghodosi, Hossein [Editor]; Dawson, Ed [Editor];:
Information Security and Privacy: 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - edizione con copertina flessibile

2007

ISBN: 9783540734574

Springer, 2007-08-08. Paperback. Very Good. Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 2007-08-08, 3

Costi di spedizione: EUR 5.56 GuthrieBooks
4
Information Security and Privacy - Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Ordina
da lehmanns.de
€ 101,64
Spedizione: € 9,951
OrdinaLink sponsorizzato
Josef Pieprzyk; Hossein Ghodosi; Ed Dawson:
Information Security and Privacy - edizione con copertina flessibile

2007, ISBN: 9783540734574

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2007

Costi di spedizione:Versand in 10-14 Tagen. (EUR 9.95)
5
Information Security and Privacy - Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Ordina
da lehmanns.de
€ 101,64
Spedizione: € 9,951
OrdinaLink sponsorizzato
Josef Pieprzyk; Hossein Ghodosi; Ed Dawson:
Information Security and Privacy - edizione con copertina flessibile

2007, ISBN: 9783540734574

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, 2007, Softcover, Buch, [PU: Springer Berlin]

Costi di spedizione:sofort lieferbar, , Sans frais d'envoi en Allemagne. (EUR 9.95)

1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.

Dati bibliografici del miglior libro corrispondente

Dettagli del libro
Information Security and Privacy

This book constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007, held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Informazioni dettagliate del libro - Information Security and Privacy


EAN (ISBN-13): 9783540734574
ISBN (ISBN-10): 3540734570
Copertina rigida
Copertina flessibile
Anno di pubblicazione: 2007
Editore: Springer Berlin
476 Pagine
Peso: 0,744 kg
Lingua: eng/Englisch

Libro nella banca dati dal 2008-01-09T10:03:59+01:00 (Zurich)
Pagina di dettaglio ultima modifica in 2024-02-19T21:03:01+01:00 (Zurich)
ISBN/EAN: 3540734570

ISBN - Stili di scrittura alternativi:
3-540-73457-0, 978-3-540-73457-4
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : hossein, dawson, josef six, held josef
Titolo del libro: privacy, information security, australasian science, australia our, computer security


Dati dell'editore

Autore: Josef Pieprzyk; Hossein Ghodosi; Ed Dawson
Titolo: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Editore: Springer; Springer Berlin
476 Pagine
Anno di pubblicazione: 2007-06-15
Berlin; Heidelberg; DE
Peso: 0,753 kg
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XIV, 476 p.

BC; Cryptology; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Information; Signatur; anonymity; authentication; bilinear pairings; biometrics; block ciphers; communication; cryptanalysis; cryptographic attacks; cryptographic hash function; data security; networks; privacy; security; algorithm analysis and problem complexity; Management of Computing and Information Systems; Systems and Data Security; Computer Communication Networks; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Cryptology; IT Operations; Data and Information Security; Computer Communication Networks; Coding and Information Theory; Algorithms; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Computersicherheit; Netzwerksicherheit; Netzwerk-Hardware; Informationstheorie; Algorithmen und Datenstrukturen; EA

Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier’s Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- “Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission.

< Per archiviare...