Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.
Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.
Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.
Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.- Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party Computations.- Implementation.- Information Leakage.- Firewall and Forensics.- Web Security.- Android Security.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309