Cantitate/Preț
Produs

Information Security, Practice and Experience: 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6047

Editat de Jin Kwak, Robert H. Deng, Guilin Wang, Yoojae Won
en Limba Engleză Paperback – 23 apr 2010

Din seria Lecture Notes in Computer Science

Preț: 33283 lei

Preț vechi: 41604 lei
-20% Nou

Puncte Express: 499

Preț estimativ în valută:
6370 6616$ 5291£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642128264
ISBN-10: 3642128262
Pagini: 416
Ilustrații: XIII, 399 p. 68 illus.
Greutate: 0.62 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Cryptanalysis.- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.- Integral Attacks on Reduced-Round ARIA Block Cipher.- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.- On the Security of NOEKEON against Side Channel Cube Attacks.- Algorithms and Implementations (I).- On Fast and Approximate Attack Tree Computations.- Width-3 Joint Sparse Form.- Accelerating Inverse of GF(2 n ) with Precomputation.- Algorithms and Implementations (II).- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis.- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups.- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.- Network Security.- Host-Based Security Sensor Integrity in Multiprocessing Environments.- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.- Rate-Based Watermark Traceback: A New Approach.- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes.- Access Control.- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk.- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),.- Identity Management.- A Trustworthy ID Management Mechanism in Open Market.- BioID: Biometric-Based Identity Management.- Trust Management.- Privacy Preserving of Trust Management Credentials Based on Trusted Computing.- Mitigating the Malicious Trust Expansion in Social Network Service.- Public Key Cryptography.- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.- Certificateless KEM and Hybrid Signcryption Schemes Revisited.- A Deniable Group Key Establishment Protocol in the Standard Model.- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting.- Security Applications.- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.- Attacking and Improving on Lee and Chiu’s Authentication Scheme Using Smart Cards.- Protection Profile for Secure E-Voting Systems.