Cantitate/Preț
Produs

Innovative Security Solutions for Information Technology and Communications: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers: Lecture Notes in Computer Science, cartea 9522

Editat de Ion Bica, David Naccache, Emil Simion
en Limba Engleză Paperback – 15 ian 2016
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Conference on Security forInformation Technology and Communications, SECITC 2015, held in Bucharest, Romania,in June 2015.
The 17 revised full papers were carefully reviewed andselected from 36 submissions. In addition with 5 invited talks the papers covertopics such as Cryptographic Algorithms and Protocols, Security Technologiesfor IT&C, Information Security Management, Cyber Defense, and DigitalForensics.
 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32634 lei

Preț vechi: 40793 lei
-20% Nou

Puncte Express: 490

Preț estimativ în valută:
6245 6487$ 5188£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319271781
ISBN-10: 3319271784
Pagini: 281
Ilustrații: XXIV, 281 p. 88 illus.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.44 kg
Ediția:1st ed. 2015
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Authenticated-Encryption: Security Notions, Designs and Applications .- NewResults on Identity-based Encryption from Quadratic Residuosity.- Efficienttechniques for extracting secrets from electronic devices.- Secure and TrustedApplication Execution on Embedded Devices.- A Number-Theoretic Error-CorrectingCode.- Full duplex OTP cryptosystem based on DNA key for text transmissions.- Evaluationof Lightweight Block Ciphers for Embedded Systems.- SCA Resistance Analysis onFPGA Implementations of Sponge based MAC-PHOTON.- A Novel Fast and SecureChaos-Based Algorithm for Image Encryption.- A Novel Key Management forVirtually Limitless Key Size.- Efficient Montgomery Multiplication on GPUs.- ApplyingCryptographic Acceleration Techniques to Error Correction.- A Cooperative BlackHole Node Detection and Mitigation Approach for MANETs.- Up-high to Down-low:Applying Machine Learning to an Exploit Database.- Detecting Computers in theCyber Space Maliciously Exploited as SSH Proxies.-On a LightweightAuthentication Protocol for RFID.- Spam Filtering using Automated ClassifyingServices Over a Cloud Computing Infrastructure.- Contributions toSteganographic Techniques on Mobile Devices.- Secure implementation of Streamcipher: Trivium.- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting.

Caracteristici

Includes supplementary material: sn.pub/extras