Information Security and Privacy: 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings: Lecture Notes in Computer Science, cartea 2119
Editat de Vijay Varadharajan, Yi Muen Limba Engleză Paperback – 27 iun 2001
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 344.42 lei
Preț vechi: 430.53 lei
-20% Nou
Puncte Express: 517
Preț estimativ în valută:
65.92€ • 68.56$ • 55.24£
65.92€ • 68.56$ • 55.24£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540423003
ISBN-10: 3540423001
Pagini: 540
Ilustrații: XI, 522 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.75 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540423001
Pagini: 540
Ilustrații: XI, 522 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.75 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.- Improved Cryptanalysis of the Self-Shrinking Generator.- Attacks Based on Small Factors in Various Group Structures.- On Classifying Conference Key Distribution Protocols.- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.- New Public-Key Cryptosystem Using Divisor Class Groups.- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields.- Practical Key Recovery Schemes.- Non-deterministic Processors.- Personal Secure Booting.- Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules.- A Strategy for MLS Workflow.- Condition-Driven Integration of Security Services.- SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes.- Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.- Private Information Retrieval Based on the Subgroup Membership Problem.- A Practical English Auction with One-Time Registration.- A User Authentication Scheme with Identity and Location Privacy.- An End-to-End Authentication Protocol in Wireless Application Protocol.- Error Detection and Authentication in Quantum Key Distribution.- An Axiomatic Basis for Reasoning about Trust in PKIs.- A Knowledge-Based Approach to Internet Authorizations.- Applications of Trusted Review to Information Security.- Network Security Modeling and Cyber Attack Simulation Methodology.- Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS.- Improving the Availability of Time-Stamping Services.- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group.- Democratic Systems.- Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme.- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates.- How to Construct Fail-Stop Confirmer Signature Schemes.- Signature Schemes Based on 3rd Order Shift Registers.- Anonymous Statistical Survey of Attributes.- Secure Mobile Agent Using Strong Non-designated Proxy Signature.- Elliptic Curve Based Password Authenticated Key Exchange Protocols.- Elliptic Curve Cryptography on a Palm OS Device.- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field.
Caracteristici
Includes supplementary material: sn.pub/extras