This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Software Security.- Extending .NET Security to Unmanaged Code.- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.- Privacy and Anonymity.- Low Latency Anonymity with Mix Rings.- Breaking Four Mix-Related Schemes Based on Universal Re-encryption.- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy.- Protecting Data Privacy Through Hard-to-Reverse Negative Databases.- Block Ciphers and Hash Functions.- Related-Key Rectangle Attack on 42-Round SHACAL-2.- On the Collision Resistance of RIPEMD-160.- Digital Signatures.- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption.- Multi-party Concurrent Signatures.- Formal Security Model of Multisignatures.- Cryptanalysis of Variants of UOV.- Stream Ciphers.- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles.- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD’s.- Encryption I.- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice.- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search.- Collusion-Free Policy-Based Encryption.- Pervasive Computing.- Using Multiple Smart Cards for Signing Messages at Malicious Terminals.- Diverging Keys in Wireless Sensor Networks.- Encryption II.- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.- Transparent Image Encryption Using Progressive JPEG.- Network Security.- Preserving TCP Connections Across Host Address Changes.- A Security Architecture for Protecting LAN Interactions.- Simulation of Internet DDoS Attacks and Defense.- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr.- Watermarking and DRM.- Rights Protection for Data Cubes.- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM).- Intrusion Detection and Worms.- Resistance Analysis to Intruders’ Evasion of Detecting Intrusion.- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks.- Anomaly Intrusion Detection Based on Clustering a Data Stream.- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation.- Key Exchange.- An Authentication and Key Exchange Protocol for Secure Credential Services.- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.- Security Protocols and Formal Methods.- Formalising Receipt-Freeness.- Enhancing the Security and Efficiency of 3-D Secure.- Designing and Verifying Core Protocols for Location Privacy.- Information Systems Security.- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches.- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness.
Book by None
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 64,02 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiGRATIS per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Basi6 International, Irving, TX, U.S.A.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Codice articolo ABEJUNE24-355576
Quantità: 1 disponibili
Da: ALLBOOKS1, Direk, SA, Australia
Codice articolo SHUB355576
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783540383413_new
Quantità: Più di 20 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 5105133-n
Quantità: Più di 20 disponibili
Da: moluna, Greven, Germania
Condizione: New. This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 18. Codice articolo 4888519
Quantità: Più di 20 disponibili
Da: Best Price, Torrance, CA, U.S.A.
Condizione: New. SUPER FAST SHIPPING. Codice articolo 9783540383413
Quantità: 2 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 5105133-n
Quantità: Più di 20 disponibili
Da: Chiron Media, Wallingford, Regno Unito
PF. Condizione: New. Codice articolo 6666-IUK-9783540383413
Quantità: 10 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 568. Codice articolo 26302714
Quantità: 1 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. 568 Illus. Codice articolo 7545253
Quantità: 1 disponibili