Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 58,93
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 78,90
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 65,15
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 67,66
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 79,96
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 1st edition. 399 pages. 9.45x6.50x1.30 inches. In Stock.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 102,91
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Idioma: Inglés
Publicado por Springer, Springer Spektrum, 2010
ISBN 10: 3642128262 ISBN 13: 9783642128264
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12 13, 2010. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con uence of new information security technologies, including their applications and their integration with IT systems invariousverticalsectors.Inpreviousyears,ISPEChastakenplaceinSingapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008),andXi an, China (2009).For all sessions,as this one,the conferencep- ceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 91 papers from 18 countries were submitted to ISPEC 2010, and 28 were selected for inclusion in the proceedings (acceptance rate 30%). The accepted papers cover multiple topics of information security and applied cr- tography. Each submission was anonymously reviewed by at least three revi- ers. We are grateful to the Program Committee, which was composed of more than 56 well-known security experts from 16 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. The conference was hosted by Soonchunhyang University, Korea, supported by Korea Internet & Security Agency (KISA), Korea; Electronics and Telec- munications Research Institute (ETRI), Korea, in Corporation with Korea - stitute of Information Security & Cryptography (KIISC), Korea, and sponsored by Korea Communications Commission (KCC), Korea. We sincerely thank the HonoraryChair and the General Chairs of ISPEC 2010 for their strong support.
Librería: preigu, Osnabrück, Alemania
EUR 50,25
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Information Security, Practice and Experience | 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings | Jin Kwak (u. a.) | Taschenbuch | xiii | Englisch | 2010 | Springer | EAN 9783642128264 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Librería: Buchpark, Trebbin, Alemania
EUR 29,90
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Sehr gut. Zustand: Sehr gut | Seiten: 416 | Sprache: Englisch | Produktart: Bücher | The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12¿13, 2010. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems invariousverticalsectors.Inpreviousyears,ISPEChastakenplaceinSingapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008),andXi¿an, China (2009).For all sessions,as this one,the conferencep- ceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 91 papers from 18 countries were submitted to ISPEC 2010, and 28 were selected for inclusion in the proceedings (acceptance rate 30%). The accepted papers cover multiple topics of information security and applied cr- tography. Each submission was anonymously reviewed by at least three revi- ers. We are grateful to the Program Committee, which was composed of more than 56 well-known security experts from 16 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. The conference was hosted by Soonchunhyang University, Korea, supported by Korea Internet & Security Agency (KISA), Korea; Electronics and Telec- munications Research Institute (ETRI), Korea, in Corporation with Korea - stitute of Information Security & Cryptography (KIISC), Korea, and sponsored by Korea Communications Commission (KCC), Korea. We sincerely thank the HonoraryChair and the General Chairs of ISPEC 2010 for their strong support.
Librería: Mispah books, Redhill, SURRE, Reino Unido
EUR 154,93
Cantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg Apr 2010, 2010
ISBN 10: 3642128262 ISBN 13: 9783642128264
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12 13, 2010. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con uence of new information security technologies, including their applications and their integration with IT systems invariousverticalsectors.Inpreviousyears,ISPEChastakenplaceinSingapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008),andXi an, China (2009).For all sessions,as this one,the conferencep- ceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 91 papers from 18 countries were submitted to ISPEC 2010, and 28 were selected for inclusion in the proceedings (acceptance rate 30%). The accepted papers cover multiple topics of information security and applied cr- tography. Each submission was anonymously reviewed by at least three revi- ers. We are grateful to the Program Committee, which was composed of more than 56 well-known security experts from 16 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. The conference was hosted by Soonchunhyang University, Korea, supported by Korea Internet & Security Agency (KISA), Korea; Electronics and Telec- munications Research Institute (ETRI), Korea, in Corporation with Korea - stitute of Information Security & Cryptography (KIISC), Korea, and sponsored by Korea Communications Commission (KCC), Korea. We sincerely thank the HonoraryChair and the General Chairs of ISPEC 2010 for their strong support. 416 pp. Englisch.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 2010
ISBN 10: 3642128262 ISBN 13: 9783642128264
Librería: moluna, Greven, Alemania
EUR 48,37
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Cryptanalysis.- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.- Integral Attacks on Reduced-Round ARIA Block Cipher.- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.- On the Security of NOEKEON against Side Chan.
Idioma: Inglés
Publicado por Springer, Springer Apr 2010, 2010
ISBN 10: 3642128262 ISBN 13: 9783642128264
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Cryptanalysis.- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.- Integral Attacks on Reduced-Round ARIA Block Cipher.- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.- On the Security of NOEKEON against Side Channel Cube Attacks.- Algorithms and Implementations (I).- On Fast and Approximate Attack Tree Computations.- Width-3 Joint Sparse Form.- Accelerating Inverse of GF(2 n ) with Precomputation.- Algorithms and Implementations (II).- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis.- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups.- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.- Network Security.- Host-Based Security Sensor Integrity in Multiprocessing Environments.- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.- Rate-Based Watermark Traceback: A New Approach.- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes.- Access Control.- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk.- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),.- Identity Management.- A Trustworthy ID Management Mechanism in Open Market.- BioID: Biometric-Based Identity Management.- Trust Management.- Privacy Preserving of Trust Management Credentials Based on Trusted Computing.- Mitigating the Malicious Trust Expansion in Social Network Service.- Public Key Cryptography.- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.- Certificateless KEM and Hybrid Signcryption Schemes Revisited.- A Deniable Group Key Establishment Protocol in the Standard Model.- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting.- Security Applications.- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.- Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.- Protection Profile for Secure E-Voting Systems.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 416 pp. Englisch.