Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom: IFIP Advances in Information and Communication Technology, cartea 175
Editat de David Chadwick, Bart Preneelen Limba Engleză Paperback – dec 2014
This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers.
This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 616.49 lei 6-8 săpt. | |
Springer Us – dec 2014 | 616.49 lei 6-8 săpt. | |
Hardback (1) | 622.62 lei 6-8 săpt. | |
Springer Us – 4 mar 2005 | 622.62 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20% Preț: 170.51 lei
- 20% Preț: 615.74 lei
- 20% Preț: 327.52 lei
- Preț: 382.45 lei
- 20% Preț: 323.38 lei
- 20% Preț: 328.15 lei
- 20% Preț: 503.41 lei
- 17% Preț: 523.40 lei
- 20% Preț: 502.06 lei
- 17% Preț: 488.96 lei
- 20% Preț: 501.04 lei
- 20% Preț: 403.20 lei
- 20% Preț: 1162.12 lei
- 20% Preț: 1239.38 lei
- 18% Preț: 1180.67 lei
- 20% Preț: 1233.36 lei
- 18% Preț: 1177.76 lei
- 18% Preț: 916.91 lei
- 18% Preț: 917.08 lei
- 18% Preț: 909.20 lei
- 18% Preț: 912.36 lei
- 15% Preț: 621.05 lei
- 18% Preț: 923.74 lei
- 20% Preț: 1239.23 lei
- 20% Preț: 960.84 lei
- 18% Preț: 913.26 lei
- 20% Preț: 1235.12 lei
- 20% Preț: 958.15 lei
- 15% Preț: 621.37 lei
- 20% Preț: 1228.29 lei
- 20% Preț: 1849.95 lei
- 20% Preț: 1237.17 lei
- 18% Preț: 920.43 lei
- 18% Preț: 910.85 lei
- 18% Preț: 1177.92 lei
- 20% Preț: 1229.40 lei
- 18% Preț: 916.91 lei
- 18% Preț: 912.06 lei
- 20% Preț: 1243.52 lei
- 18% Preț: 919.96 lei
- 20% Preț: 621.37 lei
- 18% Preț: 1188.40 lei
- 20% Preț: 1235.75 lei
- 18% Preț: 1184.32 lei
- 20% Preț: 955.45 lei
- 20% Preț: 1240.04 lei
- 20% Preț: 949.76 lei
- 18% Preț: 1763.71 lei
- 20% Preț: 1243.19 lei
Preț: 616.49 lei
Preț vechi: 725.28 lei
-15% Nou
Puncte Express: 925
Preț estimativ în valută:
117.99€ • 124.47$ • 98.33£
117.99€ • 124.47$ • 98.33£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781461498933
ISBN-10: 1461498937
Pagini: 304
Ilustrații: XIV, 290 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.43 kg
Ediția:2005
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
ISBN-10: 1461498937
Pagini: 304
Ilustrații: XIV, 290 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.43 kg
Ediția:2005
Editura: Springer Us
Colecția Springer
Seria IFIP Advances in Information and Communication Technology
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Privacy/Anonymity.- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols.- Personal Attributes and Privacy.- Mobile Security 1.- Local Management of Credits and Debits in Mobile Ad Hoc Networks.- How Secure are Current Mobile Operating Systems?.- An Overview of Security Issues and Techniques in Mobile Agents.- Mobile Security 2.- A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.- Mobile Trust Negotiation.- Weak Context Establishment Procedure for Mobility and Multi-Homing Management.- Security in Microsoft .Net.- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.- Threat Modelling for Web Services Based Web Applications.- Threat Modelling for ASP.NET.- Threat Modelling for SQL Servers.- Threat Modelling for Active Directory.- Threat Modelling for Security Tokens in Web Applications.- Cryptography.- Analysis of the DVB Common Scrambling Algorithm.- An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.- Multimedia Security.- Robust Visual Hashing Using JPEG 2000.- A System for End-to-End Authentication of Adaptive Multimedia Content.- Application Level Security.- Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.- Secure Role Based Messaging.- Five Non-Technical Pillars of Network Information Security Management.
Textul de pe ultima copertă
International Federation for Information Processing
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit springeronline.com.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
For more information about the 300 other books in the IFIP series, please visit springeronline.com.
Caracteristici
Presents some of the very latest developments in security research from leading experts in the field communications and multimedia security Includes supplementary material: sn.pub/extras