Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers: Lecture Notes in Computer Science, cartea 5379
Editat de Kiwook Sohn, Moti Yungen Limba Engleză Paperback – 13 feb 2009
Din seria Lecture Notes in Computer Science
- 20% Preț: 1005.39 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.19 lei
- 20% Preț: 238.01 lei
- 20% Preț: 554.98 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 782.28 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 550.29 lei
- 20% Preț: 560.32 lei
- 20% Preț: 319.32 lei
- 15% Preț: 549.86 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 548.74 lei
- 20% Preț: 172.69 lei
- 20% Preț: 611.22 lei
- 20% Preț: 970.25 lei
- 20% Preț: 552.64 lei
- 20% Preț: 315.78 lei
- 20% Preț: 315.78 lei
- 20% Preț: 722.90 lei
- 20% Preț: 722.90 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.94 lei
- 20% Preț: 552.64 lei
- Preț: 389.31 lei
- 20% Preț: 564.99 lei
- 20% Preț: 724.49 lei
- 20% Preț: 552.64 lei
- 20% Preț: 1018.35 lei
- 20% Preț: 331.82 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 371.81 lei
Nou
Puncte Express: 558
Preț estimativ în valută:
71.20€ • 77.01$ • 59.33£
71.20€ • 77.01$ • 59.33£
Carte tipărită la comandă
Livrare economică 11-25 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642003059
ISBN-10: 3642003052
Pagini: 334
Ilustrații: XI, 334 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.52 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642003052
Pagini: 334
Ilustrații: XI, 334 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.52 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Smart Card and Secure Hardware(1).- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation.- Template Attacks on ECDSA.- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool.- Wireless and Sensor Network Security(1).- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network.- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.- Securing Layer-2 Path Selection in Wireless Mesh Networks.- Public Key Crypto Applications.- Public Key Authentication with Memory Tokens.- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.- Privacy and Anonymity.- Sanitizable and Deletable Signature.- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.- N/W Security and Intrusion Detection.- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512.- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence.- Application Security and Trust Management.- Image-Feature Based Human Identification Protocols on Limited Display Devices.- Ternary Subset Difference Method and Its Quantitative Analysis.- Data Deletion with Provable Security.- Smart Card and Secure Hardware(2).- A Probing Attack on AES.- On Avoiding ZVP-Attacks Using Isogeny Volcanoes.- Security Analysisof DRBG Using HMAC in NIST SP 800-90.- Wireless and Sensor Network Security(2).- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module.- An Improved Distributed Key Management Scheme in Wireless Sensor Networks.- Protection Profile for Connected Interoperable DRM Framework.
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008.
The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.
The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.