- 5 Risultati
prezzo più basso: € 53,49, prezzo più alto: € 109,99, prezzo medio: € 72,37
1
Information Security
Ordina
da Springer.com
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato

Information Security - nuovo libro

2006, ISBN: 9783540383413

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 – September 2, 2006. The Conference was org… Altro …

Nr. 978-3-540-38341-3. Costi di spedizione:Worldwide free shipping, , DE. (EUR 0.00)
2
Information Security / 9th International Conference ISC 2006, Samos Island, Greece, August 30- September 2, 2006, Proceedings / Sokratis K. Katsikas (u. a.) / Taschenbuch / Englisch / 2006 - Katsikas, Sokratis K.
Ordina
da booklooker.de
€ 77,90
Spedizione: € 0,001
OrdinaLink sponsorizzato

Katsikas, Sokratis K.:

Information Security / 9th International Conference ISC 2006, Samos Island, Greece, August 30- September 2, 2006, Proceedings / Sokratis K. Katsikas (u. a.) / Taschenbuch / Englisch / 2006 - edizione con copertina flessibile

2006, ISBN: 9783540383413

[ED: Taschenbuch], [PU: Springer-Verlag GmbH], This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, … Altro …

Costi di spedizione:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchbär
3
Information Security - Katsikas, Sokratis K. / Lopez, Javier / Backes, Michael / Gritzalis, Stefanos / Preneel, Bart
Ordina
da booklooker.de
€ 66,99
Spedizione: € 0,001
OrdinaLink sponsorizzato
Katsikas, Sokratis K. / Lopez, Javier / Backes, Michael / Gritzalis, Stefanos / Preneel, Bart:
Information Security - edizione con copertina flessibile

2006

ISBN: 9783540383413

[ED: Softcover], [PU: Springer / Springer Berlin Heidelberg / Springer, Berlin], This book constitutes the refereed proceedings of the 9th International Conference on Information Security… Altro …

Costi di spedizione:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) buecher.de GmbH & Co. KG
4
Information Security - Sokratis K. Katsikas; Michael Backes; Stefanos Gritzalis; Bart Preneel
Ordina
da lehmanns.de
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato
Sokratis K. Katsikas; Michael Backes; Stefanos Gritzalis; Bart Preneel:
Information Security - Prima edizione

2006, ISBN: 9783540383413

edizione con copertina flessibile

9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, Buch, Softcover, [PU: Springer Berlin], [ED: 1], Springer Berlin, 2006

Costi di spedizione:Versand in 10-14 Tagen. (EUR 0.00)
5
Information Security
Ordina
da eBook.de
€ 109,99
Spedizione: € 0,001
OrdinaLink sponsorizzato
Information Security - edizione con copertina flessibile

2006, ISBN: 9783540383413

Information Security - 9th International Conference; ISC 2006 Samos Island Greece August 30- September 2 2006 Proceedings. Auflage 2006: ab 109.99 € Bücher > Ratgeber > Computer & Interne… Altro …

Costi di spedizione:in stock, , , DE. (EUR 0.00)

1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.

Dati bibliografici del miglior libro corrispondente

Dettagli del libro
Information Security

This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.

Informazioni dettagliate del libro - Information Security


EAN (ISBN-13): 9783540383413
ISBN (ISBN-10): 3540383417
Copertina rigida
Copertina flessibile
Anno di pubblicazione: 2006
Editore: Springer Berlin
548 Pagine
Peso: 0,836 kg
Lingua: eng/Englisch

Libro nella banca dati dal 2007-05-15T22:42:10+02:00 (Zurich)
Pagina di dettaglio ultima modifica in 2023-12-27T11:55:08+01:00 (Zurich)
ISBN/EAN: 9783540383413

ISBN - Stili di scrittura alternativi:
3-540-38341-7, 978-3-540-38341-3
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : michael bart, backes, back stefan, lopez, sokratis, stefanos katsikas
Titolo del libro: computer security, information security, proceedings the 9th international, conférence, lncs, samo, proceedings conference, 2006, august, september island, samos band, greece


Dati dell'editore

Autore: Sokratis K. Katsikas; Michael Backes; Stefanos Gritzalis; Bart Preneel
Titolo: Lecture Notes in Computer Science; Security and Cryptology; Information Security - 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Editore: Springer; Springer Berlin
548 Pagine
Anno di pubblicazione: 2006-08-17
Berlin; Heidelberg; DE
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 548 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; Bluetooth; Code; Distributed Denial of Service; Information; RSA; Routing; authentication; cryptographic protocols; data security; digital signature schemes; information security; secure communications; security; smart card; systems security; algorithm analysis and problem complexity; Cryptology; Operating Systems; Algorithms; Computer Communication Networks; Special Purpose and Application-Based Systems; IT Operations; Kryptografie, Verschlüsselungstechnologie; Betriebssysteme; Algorithmen und Datenstrukturen; Netzwerk-Hardware; Wissensbasierte Systeme, Expertensysteme; Wirtschaftsmathematik und -informatik, IT-Management; EA

Software Security.- Extending .NET Security to Unmanaged Code.- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.- Privacy and Anonymity.- Low Latency Anonymity with Mix Rings.- Breaking Four Mix-Related Schemes Based on Universal Re-encryption.- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy.- Protecting Data Privacy Through Hard-to-Reverse Negative Databases.- Block Ciphers and Hash Functions.- Related-Key Rectangle Attack on 42-Round SHACAL-2.- On the Collision Resistance of RIPEMD-160.- Digital Signatures.- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption.- Multi-party Concurrent Signatures.- Formal Security Model of Multisignatures.- Cryptanalysis of Variants of UOV.- Stream Ciphers.- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles.- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s.- Encryption I.- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice.- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.- Collusion-Free Policy-Based Encryption.- Pervasive Computing.- Using Multiple Smart Cards for Signing Messages at Malicious Terminals.- Diverging Keys in Wireless Sensor Networks.- Encryption II.- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.- Transparent Image Encryption Using Progressive JPEG.- Network Security.- Preserving TCP Connections Across Host Address Changes.- A Security Architecture for Protecting LAN Interactions.- Simulation of Internet DDoS Attacks and Defense.- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.- Watermarking and DRM.- Rights Protection for Data Cubes.- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM).- IntrusionDetection and Worms.- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion.- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks.- Anomaly Intrusion Detection Based on Clustering a Data Stream.- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.- Key Exchange.- An Authentication and Key Exchange Protocol for Secure Credential Services.- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.- Security Protocols and Formal Methods.- Formalising Receipt-Freeness.- Enhancing the Security and Efficiency of 3-D Secure.- Designing and Verifying Core Protocols for Location Privacy.- Information Systems Security.- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches.- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.

< Per archiviare...