Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings: Communications in Computer and Information Science, cartea 58
Editat de Dominik Slezaken Limba Engleză Paperback – 24 noi 2009
Din seria Communications in Computer and Information Science
- 20% Preț: 325.48 lei
- 20% Preț: 669.06 lei
- 20% Preț: 324.64 lei
- 20% Preț: 337.85 lei
- 20% Preț: 656.19 lei
- 20% Preț: 659.97 lei
- 20% Preț: 333.88 lei
- 20% Preț: 337.52 lei
- 20% Preț: 656.36 lei
- 20% Preț: 656.69 lei
- 20% Preț: 659.31 lei
- Preț: 392.60 lei
- 20% Preț: 329.58 lei
- Preț: 386.00 lei
- 20% Preț: 336.02 lei
- 20% Preț: 334.53 lei
- 20% Preț: 331.74 lei
- 20% Preț: 655.85 lei
- 20% Preț: 338.49 lei
- 20% Preț: 333.88 lei
- 20% Preț: 334.53 lei
- 20% Preț: 338.68 lei
- 20% Preț: 666.58 lei
- 20% Preț: 307.20 lei
- 20% Preț: 336.02 lei
- 20% Preț: 338.68 lei
- 20% Preț: 330.24 lei
- 20% Preț: 660.81 lei
- 15% Preț: 648.42 lei
- 20% Preț: 653.56 lei
- 20% Preț: 332.06 lei
- 20% Preț: 337.85 lei
- 20% Preț: 1055.29 lei
- 20% Preț: 836.50 lei
- 20% Preț: 656.69 lei
- 20% Preț: 1231.01 lei
- 20% Preț: 331.25 lei
- 20% Preț: 336.02 lei
- 20% Preț: 323.00 lei
- 20% Preț: 113.94 lei
- 20% Preț: 336.21 lei
- Preț: 387.75 lei
- 20% Preț: 470.58 lei
- 20% Preț: 750.86 lei
- 20% Preț: 337.00 lei
- 20% Preț: 327.95 lei
- 20% Preț: 410.03 lei
- 20% Preț: 335.36 lei
- 20% Preț: 534.59 lei
- 20% Preț: 673.02 lei
Preț: 391.61 lei
Nou
Puncte Express: 587
Preț estimativ în valută:
74.94€ • 77.77$ • 62.64£
74.94€ • 77.77$ • 62.64£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642108464
ISBN-10: 3642108466
Pagini: 321
Ilustrații: XIII, 308 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642108466
Pagini: 321
Ilustrații: XIII, 308 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.5 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.