Information Security and Cryptology - ICISC 2005: 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers: Lecture Notes in Computer Science, cartea 3935
Editat de Dongho Won, Seungjoo Kimen Limba Engleză Paperback – 18 apr 2006
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 340.32 lei
- 20% Preț: 341.95 lei
- 20% Preț: 453.32 lei
- 20% Preț: 238.01 lei
- 20% Preț: 340.32 lei
- 20% Preț: 438.69 lei
- Preț: 449.57 lei
- 20% Preț: 343.62 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 645.28 lei
- 17% Preț: 427.22 lei
- 20% Preț: 655.02 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 591.51 lei
- Preț: 381.21 lei
- 20% Preț: 337.00 lei
- 15% Preț: 438.59 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 575.48 lei
- 20% Preț: 583.40 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 353.50 lei
- 20% Preț: 585.88 lei
- Preț: 410.88 lei
- 20% Preț: 596.46 lei
- 20% Preț: 763.23 lei
- 20% Preț: 825.93 lei
- 20% Preț: 649.49 lei
- 20% Preț: 350.21 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 388.48 lei
Nou
Puncte Express: 583
Preț estimativ în valută:
74.37€ • 77.60$ • 62.34£
74.37€ • 77.60$ • 62.34£
Carte tipărită la comandă
Livrare economică 08-14 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540333548
ISBN-10: 3540333541
Pagini: 476
Ilustrații: XIV, 458 p.
Dimensiuni: 155 x 233 x 25 mm
Greutate: 0.67 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540333541
Pagini: 476
Ilustrații: XIV, 458 p.
Dimensiuni: 155 x 233 x 25 mm
Greutate: 0.67 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- National Security, Forensics and Mobile Communications.- Information Security as Interdisciplinary Science Based on Ethics.- Key Management and Distributed Cryptography.- A Timed-Release Key Management Scheme for Backward Recovery.- Property-Based Broadcast Encryption for Multi-level Security Policies.- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption.- Authentication and Biometrics.- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image.- Trust Management for Resilient Wireless Sensor Networks.- Improvements to Mitchell’s Remote User Authentication Protocol.- Efficient Authenticators with Application to Key Exchange.- Provable Security and Primitives.- Benes and Butterfly Schemes Revisited.- Relative Doubling Attack Against Montgomery Ladder.- Improved Collision Attack on MD4 with Probability Almost 1.- Finding Collision on 45-Step HAS-160.- System/Network Security.- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.- The Dilemma of Covert Channels Searching.- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.- Foundations of Attack Trees.- Block/Stream Ciphers (I).- An Algebraic Masking Method to Protect AES Against Power Attacks.- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.- Integral Cryptanalysis of Reduced FOX Block Cipher.- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.- Block/Stream Ciphers (II).- Cryptanalysis of Sfinks.- Weaknesses of COSvd (2,128) Stream Cipher.- Expanding Weak PRF with Small Key Size.- On Linear Systems of Equations with Distinct Variables and Small Block Size.- Efficient Implementations.- An FPGA Implementation of CCM Mode UsingAES.- New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.- An Efficient Design of CCMP for Robust Security Network.- Digital Rights Management.- Software-Based Copy Protection for Temporal Media During Dissemination and Playback.- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme.- Public Key Cryptography.- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.- An Efficient Static Blind Ring Signature Scheme.- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.- Yet Another Forward Secure Signature from Bilinear Pairings.