Cantitate/Preț
Produs

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4298

Editat de Jae-Kwang Lee, Okyeon Yi, Moti Yung
en Limba Engleză Paperback – 30 mar 2007

Din seria Lecture Notes in Computer Science

Preț: 39716 lei

Nou

Puncte Express: 596

Preț estimativ în valută:
7602 7906$ 6370£

Carte tipărită la comandă

Livrare economică 13-27 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540710929
ISBN-10: 3540710922
Pagini: 428
Ilustrații: XIV, 410 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.63 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Public Key Crypto Applications/Virus Protection.- Controllable Ring Signatures.- Efficient User Authentication and Key Agreement in Wireless Sensor Networks.- Identity-Based Key Issuing Without Secure Channel in a Broad Area.- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.- Cyber Indication/Intrusion Detection.- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks.- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm.- Biometrics/Security Trust Management.- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.- Quality Assurance for Evidence Collection in Network Forensics.- Secure Software/Systems.- Visualization of Permission Checks in Java Using Static Analysis.- Deployment of Virtual Machines in Lock-Keeper.- Smart Cards/Secure Hardware.- Investigations of Power Analysis Attacks and Countermeasures for ARIA.- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.- A Novel Key Agreement Scheme in a Multiple Server Environment.- Mobile Security.- Cost-Effective IDS Operating Scheme in MANETs.- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6.- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security.- Distributed Management of OMA DRM Domains.- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting.- A Key Management Based on Multiple Regression in Hierarchical Sensor Network.- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.- Privacy/Anonymity.- Privacy Protection in PKIs: A Separation-of-Authority Approach.- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.- Secret Handshake with Multiple Groups.- Internet and Wireless Security.- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.- EAP Using the Split Password-Based Authenticated Key Agreement.- How Many Malicious Scanners Are in the Internet?.- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.