Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings: Lecture Notes in Computer Science, cartea 2836
Editat de Petra Perner, Dieter Gollmann, Jianying Zhouen Limba Engleză Paperback – 29 sep 2003
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 381.21 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 15% Preț: 438.59 lei
- 20% Preț: 591.51 lei
- 20% Preț: 649.49 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 339.34 lei
Preț vechi: 424.17 lei
-20% Nou
Puncte Express: 509
Preț estimativ în valută:
64.94€ • 67.39$ • 54.28£
64.94€ • 67.39$ • 54.28£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540201502
ISBN-10: 3540201505
Pagini: 436
Ilustrații: X, 418 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.61 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540201505
Pagini: 436
Ilustrații: X, 418 p.
Dimensiuni: 152 x 229 x 23 mm
Greutate: 0.61 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
A Fast Square Root Computation Using the Frobenius Mapping.- A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents.- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.- A Policy Based Framework for Access Control.- Trading-Off Type-Inference Memory Complexity against Communication.- Security Remarks on a Group Signature Scheme with Member Deletion.- An Efficient Known Plaintext Attack on FEA-M.- An Efficient Public-Key Framework.- ROCEM: Robust Certified E-mail System Based on Server-Supported Signature.- Practical Service Charge for P2P Content Distribution.- ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback.- A Lattice Based General Blind Watermark Scheme.- Role-Based Access Control and the Access Control Matrix.- Broadcast Encryption Schemes Based on the Sectioned Key Tree.- Research on the Collusion Estimation.- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains.- Protocols for Malicious Host Revocation.- A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code.- A Novel Two-Level Trust Model for Grid.- Practical t-out-n Oblivious Transfer and Its Applications.- Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.- ID-Based Distributed “Magic Ink” Signature from Pairings.- A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.- Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.- A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems.- A Novel Efficient Group Signature Scheme with Forward Security.- Variations of Diffie-Hellman Problem.- A Study on the CovertChannel Detection of TCP/IP Header Using Support Vector Machine.- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.- UC-RBAC: A Usage Constrained Role-Based Access Control Model.- (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography.- An Optimized Multi-bits Blind Watermarking Scheme.- A Compound Intrusion Detection Model.- An Efficient Convertible Authenticated Encryption Scheme and Its Variant.- Space-Economical Reassembly for Intrusion Detection System.- A Functional Decomposition of Virus and Worm Programs.
Caracteristici
Includes supplementary material: sn.pub/extras