Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings: Communications in Computer and Information Science, cartea 76
Editat de Samir Kumar Bandyopadhyay, Wael Adi, Tai-hoon Kim, Yang Xiaoen Limba Engleză Paperback – 9 iun 2010
Din seria Communications in Computer and Information Science
- 20% Preț: 313.24 lei
- 20% Preț: 643.76 lei
- 20% Preț: 312.43 lei
- 20% Preț: 325.13 lei
- 20% Preț: 631.37 lei
- 20% Preț: 635.01 lei
- 20% Preț: 321.32 lei
- 20% Preț: 324.82 lei
- 20% Preț: 631.54 lei
- 20% Preț: 631.86 lei
- 20% Preț: 634.38 lei
- Preț: 377.83 lei
- 20% Preț: 317.19 lei
- Preț: 371.51 lei
- 20% Preț: 323.38 lei
- 20% Preț: 321.95 lei
- 20% Preț: 319.26 lei
- 20% Preț: 631.05 lei
- 20% Preț: 325.76 lei
- 20% Preț: 321.32 lei
- 20% Preț: 321.95 lei
- 20% Preț: 325.94 lei
- 20% Preț: 641.37 lei
- 20% Preț: 307.20 lei
- 20% Preț: 323.38 lei
- 20% Preț: 325.94 lei
- 20% Preț: 317.82 lei
- 20% Preț: 635.81 lei
- 15% Preț: 623.90 lei
- 20% Preț: 628.85 lei
- 20% Preț: 319.58 lei
- 20% Preț: 325.13 lei
- 20% Preț: 1015.29 lei
- 20% Preț: 804.84 lei
- 20% Preț: 631.86 lei
- 20% Preț: 1184.31 lei
- 20% Preț: 318.80 lei
- 20% Preț: 323.38 lei
- 20% Preț: 310.86 lei
- 20% Preț: 741.20 lei
- 20% Preț: 113.94 lei
- 20% Preț: 323.56 lei
- Preț: 373.19 lei
- 20% Preț: 470.58 lei
- 20% Preț: 722.44 lei
- 20% Preț: 324.32 lei
- 20% Preț: 315.62 lei
- 20% Preț: 394.57 lei
- 20% Preț: 322.75 lei
- 20% Preț: 514.40 lei
Preț: 322.75 lei
Preț vechi: 403.44 lei
-20% Nou
Puncte Express: 484
Preț estimativ în valută:
61.77€ • 65.16$ • 51.48£
61.77€ • 65.16$ • 51.48£
Carte disponibilă
Livrare economică 12-26 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642133640
ISBN-10: 3642133649
Pagini: 350
Ilustrații: 350 p. 151 illus.
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642133649
Pagini: 350
Ilustrații: 350 p. 151 illus.
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition.- Security Improvement on a Remote User Authentication Scheme Using Smart Cards.- Dual-Byte-Marker Algorithm for Detecting JFIF Header.- Hiding Data in JPEG Using in-DQT Technique.- An Analysis of Syndrome Coding.- Intrusion Correlation Using Ontologies and Multi-agent Systems.- Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN.- Fault Attacks against the Miller’s Algorithm in Edwards Coordinates.- A Cryptosystem for Encryption and Decryption of Long Confidential Messages.- Lane Design for Speed Optimization.- Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.- IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach.- Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.- Pattern Recognition Using Artificial Neural Network: A Review.- PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks.- Tracing Potential School Shooters in the Digital Sphere.- Infrastructure Aided Privacy Preserving-Authentication in VANETs.- Attacks on Bluetooth Security Architecture and Its Countermeasures.- Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.- Security Risks of Cloud Computing and Its Emergence as 5th Utility Service.- Performance Evaluation of Video Streaming in Vehicular Adhoc Network.- Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network.- Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.- MPLS Unleashed: Remedy Using IPSEC over MPLS VPN.- A New Holistic Security Approach for Government CriticalSystems: Flooding Prevention.- Sensor Aided Authentication.- Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection.- TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones.- An Improved EKG-Based Key Agreement Scheme for Body Area Networks.- Multi-agent Reinforcement Learning Model for Effective Action Selection.
Caracteristici
Up-to-date results Fast track conference proceedings State-of-the-art report