Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings: Lecture Notes in Computer Science, cartea 2836
Editat de Petra Perner, Dieter Gollmann, Jianying Zhouen Limba Engleză Paperback – 29 sep 2003
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 567.60 lei
- 20% Preț: 571.63 lei
- 15% Preț: 568.74 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 574.05 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 20% Preț: 649.49 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 20% Preț: 575.48 lei
- 20% Preț: 747.79 lei
- 20% Preț: 1053.45 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 809.19 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 1159.14 lei
- 20% Preț: 747.79 lei
- Preț: 389.48 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 332.50 lei
Preț vechi: 415.63 lei
-20% Nou
Puncte Express: 499
Preț estimativ în valută:
63.63€ • 66.10$ • 52.86£
63.63€ • 66.10$ • 52.86£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540201502
ISBN-10: 3540201505
Pagini: 436
Ilustrații: X, 418 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.61 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540201505
Pagini: 436
Ilustrații: X, 418 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.61 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
A Fast Square Root Computation Using the Frobenius Mapping.- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.- A Policy Based Framework for Access Control.- Trading-Off Type-Inference Memory Complexity against Communication.- Security Remarks on a Group Signature Scheme with Member Deletion.- An Efficient Known Plaintext Attack on FEA-M.- An Efficient Public-Key Framework.- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.- Practical Service Charge for P2P Content Distribution.- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.- A Lattice Based General Blind Watermark Scheme.- Role-Based Access Control and the Access Control Matrix.- Broadcast Encryption Schemes Based on the Sectioned Key Tree.- Research on the Collusion Estimation.- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains.- Protocols for Malicious Host Revocation.- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code.- A Novel Two-Level Trust Model for Grid.- Practical t-out-n Oblivious Transfer and Its Applications.- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.- ID-Based Distributed “Magic Ink” Signature from Pairings.- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.- A Novel Efficient Group Signature Scheme with Forward Security.- Variations of Diffie-Hellman Problem.- A Study on the CovertChannel Detection of TCP/IP Header Using Support Vector Machine.- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.- UC-RBAC: A Usage Constrained Role-Based Access Control Model.- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.- An Optimized Multi-bits Blind Watermarking Scheme.- A Compound Intrusion Detection Model.- An Efficient Convertible Authenticated Encryption Scheme and Its Variant.- Space-Economical Reassembly for Intrusion Detection System.- A Functional Decomposition of Virus and Worm Programs.
Caracteristici
Includes supplementary material: sn.pub/extras