Applied Cryptography and Network Security (eBook, PDF)
6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings
Redaktion: Bellovin, Steven M.; Yung, Moti; Keromytis, Angelos D.; Gennaro, Rosario
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Applied Cryptography and Network Security (eBook, PDF)
6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings
Redaktion: Bellovin, Steven M.; Yung, Moti; Keromytis, Angelos D.; Gennaro, Rosario
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 11.75MB
Andere Kunden interessierten sich auch für
- Applied Cryptography and Network Security (eBook, PDF)73,95 €
- Applied Cryptography and Network Security (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)40,95 €
- Privacy Enhancing Technologies (eBook, PDF)40,95 €
- Security Protocols (eBook, PDF)40,95 €
- Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (eBook, PDF)40,95 €
- Cryptographic Hardware and Embedded Systems -- CHES 2015 (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
The 30 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers address all aspects of applied cryptography and network security with special focus on novel paradigms, original directions, and non-traditional perspectives.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 508
- Erscheinungstermin: 27. Mai 2008
- Englisch
- ISBN-13: 9783540689140
- Artikelnr.: 44134228
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 508
- Erscheinungstermin: 27. Mai 2008
- Englisch
- ISBN-13: 9783540689140
- Artikelnr.: 44134228
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
On the Effectiveness of Internal Patching Against File-Sharing Worms.- Peeking Through the Cloud: DNS-Based Estimation and Its Applications.- Pushback for Overlay Networks: Protecting Against Malicious Insiders.- PPAA: Peer-to-Peer Anonymous Authentication.- Generic Constructions of Stateful Public Key Encryption and Their Applications.- Traceable and Retrievable Identity-Based Encryption.- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.- Attacking Reduced Round SHA-256.- Dakota - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.- Replay Attack in a Fair Exchange Protocol.- Improved Conditional E-Payments.- Anonymity in Transferable E-cash.- Generic Security-Amplifying Methods of Ordinary Digital Signatures.- New Differential-Algebraic Attacks and Reparametrization of Rainbow.- Trapdoor Sanitizable Signatures and Their Application to Content Protection.- Multi-factor Authenticated Key Exchange.- Repelling Detour Attack Against Onions with Re-encryption.- Analysis of EAP-GPSK Authentication Protocol.- Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns.- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.- An Authentication Scheme Based on the Twisted Conjugacy Problem.- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation.- On the Security of the CCM Encryption Mode and of a Slight Variant.- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm.- A Very Compact "Perfectly Masked" S-Box for AES.- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.- Traceable Privacy of Recent Provably-Secure RFID Protocols.- The Security of EPC Gen2 Compliant RFID Protocols.
On the Effectiveness of Internal Patching Against File-Sharing Worms.- Peeking Through the Cloud: DNS-Based Estimation and Its Applications.- Pushback for Overlay Networks: Protecting Against Malicious Insiders.- PPAA: Peer-to-Peer Anonymous Authentication.- Generic Constructions of Stateful Public Key Encryption and Their Applications.- Traceable and Retrievable Identity-Based Encryption.- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.- Attacking Reduced Round SHA-256.- Dakota - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.- Replay Attack in a Fair Exchange Protocol.- Improved Conditional E-Payments.- Anonymity in Transferable E-cash.- Generic Security-Amplifying Methods of Ordinary Digital Signatures.- New Differential-Algebraic Attacks and Reparametrization of Rainbow.- Trapdoor Sanitizable Signatures and Their Application to Content Protection.- Multi-factor Authenticated Key Exchange.- Repelling Detour Attack Against Onions with Re-encryption.- Analysis of EAP-GPSK Authentication Protocol.- Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns.- PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.- An Authentication Scheme Based on the Twisted Conjugacy Problem.- Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.- A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation.- On the Security of the CCM Encryption Mode and of a Slight Variant.- wNAF *, an Efficient Left-to-Right Signed Digit Recoding Algorithm.- A Very Compact "Perfectly Masked" S-Box for AES.- Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.- Traceable Privacy of Recent Provably-Secure RFID Protocols.- The Security of EPC Gen2 Compliant RFID Protocols.