Information Security, Practice and Experience (eBook, PDF)
6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings
Redaktion: Kwak, Jin; Won, Yoojae; Wang, Guilin; Deng, Robert H.
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Information Security, Practice and Experience (eBook, PDF)
6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings
Redaktion: Kwak, Jin; Won, Yoojae; Wang, Guilin; Deng, Robert H.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.71MB
Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 399
- Erscheinungstermin: 9. Mai 2010
- Englisch
- ISBN-13: 9783642128271
- Artikelnr.: 44228092
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Cryptanalysis.- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.- Integral Attacks on Reduced-Round ARIA Block Cipher.- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.- On the Security of NOEKEON against Side Channel Cube Attacks.- Algorithms and Implementations (I).- On Fast and Approximate Attack Tree Computations.- Width-3 Joint Sparse Form.- Accelerating Inverse of GF(2 n ) with Precomputation.- Algorithms and Implementations (II).- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis.- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups.- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.- Network Security.- Host-Based Security Sensor Integrity in Multiprocessing Environments.- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.- Rate-Based Watermark Traceback: A New Approach.- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes.- Access Control.- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk.- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),.- Identity Management.- A Trustworthy ID Management Mechanism in Open Market.- BioID: Biometric-Based Identity Management.- Trust Management.- Privacy Preserving of Trust Management Credentials Based on Trusted Computing.- Mitigating the Malicious Trust Expansion in Social Network Service.- Public Key Cryptography.- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.- Certificateless KEM and Hybrid Signcryption Schemes Revisited.- A Deniable Group Key Establishment Protocol in the Standard Model.- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting.- Security Applications.- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.- Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.- Protection Profile for Secure E-Voting Systems.
Cryptanalysis.- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.- Integral Attacks on Reduced-Round ARIA Block Cipher.- A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.- On the Security of NOEKEON against Side Channel Cube Attacks.- Algorithms and Implementations (I).- On Fast and Approximate Attack Tree Computations.- Width-3 Joint Sparse Form.- Accelerating Inverse of GF(2 n ) with Precomputation.- Algorithms and Implementations (II).- Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis.- The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups.- A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.- Network Security.- Host-Based Security Sensor Integrity in Multiprocessing Environments.- Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.- Rate-Based Watermark Traceback: A New Approach.- Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes.- Access Control.- Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk.- A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),.- Identity Management.- A Trustworthy ID Management Mechanism in Open Market.- BioID: Biometric-Based Identity Management.- Trust Management.- Privacy Preserving of Trust Management Credentials Based on Trusted Computing.- Mitigating the Malicious Trust Expansion in Social Network Service.- Public Key Cryptography.- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.- Certificateless KEM and Hybrid Signcryption Schemes Revisited.- A Deniable Group Key Establishment Protocol in the Standard Model.- Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting.- Security Applications.- Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.- Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.- Protection Profile for Secure E-Voting Systems.