Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings: Communications in Computer and Information Science, cartea 58
Editat de Dominik Slezaken Limba Engleză Paperback – 24 noi 2009
Din seria Communications in Computer and Information Science
- 20% Preț: 313.24 lei
- 20% Preț: 643.76 lei
- 20% Preț: 312.43 lei
- 20% Preț: 325.13 lei
- 20% Preț: 631.37 lei
- 20% Preț: 635.01 lei
- 20% Preț: 321.32 lei
- 20% Preț: 324.82 lei
- 20% Preț: 631.54 lei
- 20% Preț: 631.86 lei
- 20% Preț: 634.38 lei
- Preț: 377.83 lei
- 20% Preț: 317.19 lei
- Preț: 371.51 lei
- 20% Preț: 323.38 lei
- 20% Preț: 321.95 lei
- 20% Preț: 319.26 lei
- 20% Preț: 631.05 lei
- 20% Preț: 325.76 lei
- 20% Preț: 321.32 lei
- 20% Preț: 321.95 lei
- 20% Preț: 325.94 lei
- 20% Preț: 641.37 lei
- 20% Preț: 307.20 lei
- 20% Preț: 323.38 lei
- 20% Preț: 325.94 lei
- 20% Preț: 317.82 lei
- 20% Preț: 635.81 lei
- 15% Preț: 623.90 lei
- 20% Preț: 628.85 lei
- 20% Preț: 319.58 lei
- 20% Preț: 325.13 lei
- 20% Preț: 1015.29 lei
- 20% Preț: 804.84 lei
- 20% Preț: 631.86 lei
- 20% Preț: 1184.31 lei
- 20% Preț: 318.80 lei
- 20% Preț: 323.38 lei
- 20% Preț: 310.86 lei
- 20% Preț: 741.20 lei
- 20% Preț: 113.94 lei
- 20% Preț: 323.56 lei
- Preț: 373.19 lei
- 20% Preț: 470.58 lei
- 20% Preț: 722.44 lei
- 20% Preț: 324.32 lei
- 20% Preț: 315.62 lei
- 20% Preț: 394.57 lei
- 20% Preț: 322.75 lei
- 20% Preț: 514.40 lei
Preț: 376.90 lei
Nou
Puncte Express: 565
Preț estimativ în valută:
72.12€ • 76.19$ • 60.30£
72.12€ • 76.19$ • 60.30£
Carte tipărită la comandă
Livrare economică 01-15 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642108464
ISBN-10: 3642108466
Pagini: 321
Ilustrații: XIII, 308 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642108466
Pagini: 321
Ilustrații: XIII, 308 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.