Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4631
Editat de Bruce Christianson, Bruno Crispo, James A. Malcom, Michael Roeen Limba Engleză Paperback – 30 noi 2007
Din seria Lecture Notes in Computer Science
- 20% Preț: 1021.30 lei
- 20% Preț: 337.03 lei
- 20% Preț: 340.22 lei
- 20% Preț: 256.27 lei
- 20% Preț: 324.32 lei
- 20% Preț: 438.69 lei
- 20% Preț: 315.78 lei
- 20% Preț: 327.52 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 557.41 lei
- 20% Preț: 561.37 lei
- 15% Preț: 558.56 lei
- 20% Preț: 238.01 lei
- 20% Preț: 504.57 lei
- 20% Preț: 329.09 lei
- 20% Preț: 563.75 lei
- 20% Preț: 630.24 lei
- 20% Preț: 321.96 lei
- 20% Preț: 1361.10 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.39 lei
- Preț: 366.90 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.19 lei
- 20% Preț: 985.59 lei
- 20% Preț: 620.87 lei
- 20% Preț: 436.22 lei
- 20% Preț: 734.34 lei
- 20% Preț: 1034.49 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 573.92 lei
- 20% Preț: 301.95 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 327.52 lei
- 20% Preț: 794.65 lei
- 20% Preț: 569.16 lei
- Preț: 395.43 lei
- 20% Preț: 1138.26 lei
- 20% Preț: 734.34 lei
- 20% Preț: 315.78 lei
- 20% Preț: 330.70 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.98 lei
Preț: 378.57 lei
Nou
Puncte Express: 568
Preț estimativ în valută:
72.45€ • 76.43$ • 60.38£
72.45€ • 76.43$ • 60.38£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540771555
ISBN-10: 3540771557
Pagini: 360
Ilustrații: IX, 350 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.54 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540771557
Pagini: 360
Ilustrații: IX, 350 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.54 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
The System Likes You.- Experiences with Host-to-Host IPsec.- Experiences with Host-to-Host IPsec.- Repairing the Bluetooth Pairing Protocol.- Repairing the Bluetooth Pairing Protocol.- Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags.- Keep on Blockin’ in the Free World.- PIN (and Chip) or Signature: Beating the Cheating?.- PIN (and Chip) or Signature: Beating the Cheating?.- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Authorisation Subterfuge by Delegation in Decentralised Networks.- Authorisation Subterfuge by Delegation in Decentralised Networks.- Multi-channel Protocols.- Multi-channel Protocols.- Combining Crypto with Biometrics: A New Human-Security Interface.- User-Friendly Grid Security Architecture and Protocols.- User-Friendly Grid Security Architecture and Protocols.- Countering Automated Exploits with System Security CAPTCHAS.- Countering Automated Exploits with System Security CAPTCHAS.- The System Likes You?.- Enhancing Privacy with Shared Pseudo Random Sequences.- Enhancing Privacy with Shared Pseudo Random Sequences.- Non-repudiation and the Metaphysics of Presence.- Non-repudiation and the Metaphysics of Presence.- Understanding Why Some Network Protocols Are User-Unfriendly.- Understanding Why Some Network Protocols Are User-Unfriendly.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Listen Too Closely and You May Be Confused.- Listen Too Closely and You May Be Confused.- The Dining Freemasons (Security Protocols for Secret Societies).-The Dining Freemasons (Security Protocols for Secret Societies).- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).- Safer Scripting Through Precompilation.- Safer Scripting Through Precompilation.- Implementing a Multi-hat PDA.- Implementing a Multi-hat PDA.- Anonymous Context Based Role Activation Mechanism.- Anonymous Context Based Role Activation Mechanism.- Topology of Covert Conflict.- The Initial Costs and Maintenance Costs of Protocols.- The Initial Costs and Maintenance Costs of Protocols.- Alice and Bob.