Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings: Lecture Notes in Computer Science, cartea 3989
Editat de Jianying Zhou, Moti Yung, Feng Baoen Limba Engleză Paperback – 30 mai 2006
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 567.60 lei
- 20% Preț: 238.01 lei
- 15% Preț: 568.74 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 373.56 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 632.22 lei
- 20% Preț: 747.79 lei
- 20% Preț: 1053.45 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 809.19 lei
- 20% Preț: 579.56 lei
- 20% Preț: 649.49 lei
- 20% Preț: 330.23 lei
- Preț: 389.48 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 326.98 lei
- 20% Preț: 256.27 lei
- 20% Preț: 444.17 lei
- 20% Preț: 571.63 lei
- 20% Preț: 575.48 lei
- 20% Preț: 574.05 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 747.79 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 569.19 lei
- 20% Preț: 1159.14 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 642.59 lei
Preț vechi: 803.24 lei
-20% Nou
Puncte Express: 964
Preț estimativ în valută:
122.99€ • 129.03$ • 102.03£
122.99€ • 129.03$ • 102.03£
Carte tipărită la comandă
Livrare economică 29 ianuarie-12 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540347033
ISBN-10: 3540347038
Pagini: 508
Ilustrații: XIV, 490 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.7 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540347038
Pagini: 508
Ilustrații: XIV, 490 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.7 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Intrusion Avoidance and Detection.- Adaptive Detection of Local Scanners.- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection.- DSO: Dependable Signing Overlay.- Cryptographic Applications.- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?.- A Handy Multi-coupon System.- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families.- DoS: Attacks and Countermeasures.- Efficient Memory Bound Puzzles Using Pattern Databases.- Effect of Malicious Synchronization.- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets.- Key Management.- Password Based Server Aided Key Exchange.- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.- Stateful Subset Cover.- Cryptanalysis.- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions.- Breaking a New Instance of TTM Cryptosystems.- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.- Security of Limited Devices.- An AES Smart Card Implementation Resistant to Power Analysis Attacks.- Physical Security Bounds Against Tampering.- Flexible Exponentiation with Resistance to Side Channel Attacks.- Cryptography.- An Improved Poly1305 MAC.- Certificateless Public-Key Signature: Security Model and Efficient Construction.- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive.- Authentication and Web Security.- Authentication for Paranoids: Multi-party Secret Handshakes.- On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.- W3Bcrypt: Encryption as a Stylesheet.- Ad Hoc and Sensor Network Security.- Combinatorial Structures for Design of Wireless Sensor Networks.- Public Key Cryptography Sans Certificates in Ad Hoc Networks.- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks.- Cryptographic Constructions.- A GeneralMethodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.- Results on Almost Resilient Functions.- Real Perfect Contrast Visual Secret Sharing Schemes with Reversing.- Security and Privacy.- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.- Improving the Randomized Initial Point Countermeasure Against DPA.- Syntax-Driven Private Evaluation of Quantified Membership Queries.