This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007. Coverage in the 28 revised full papers presented includes intrusion detection, digital rights management, symmetric-key cryptography, cryptographic protocols and schemes, identity-based schemes, cryptanalysis, DoS protection, software obfuscation, public-key cryptosystems, elliptic curves and applications and security issues in databases.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Intrusion Detection.- Detecting System Emulators.- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.- E-NIPS: An Event-Based Network Intrusion Prediction System.- Digital Rights Management.- Enabling Fairer Digital Rights Management with Trusted Computing.- Traitor Tracing with Optimal Transmission Rate.- Symmetric-Key Cryptography.- The Security of Elastic Block Ciphers Against Key-Recovery Attacks.- Impossible-Differential Attacks on Large-Block Rijndael.- High-Speed Pipelined Hardware Architecture for Galois Counter Mode.- Cryptographic Protocols and Schemes.- Efficient Committed Oblivious Transfer of Bit Strings.- An Efficient Certified Email Protocol.- Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.- Identify-Based Cryptography.- Identity-Based Proxy Re-encryption Without Random Oracles.- Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.- Cryptanalysis.- Small Private-Exponent Attack on RSA with Primes Sharing Bits.- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.- Network Security.- Queue Management as a DoS Counter-Measure?.- Software Obfuscation.- On the Concept of Software Obfuscation in Computer Security.- Specifying Imperative Data Obfuscations.- Public-Key Cryptosystems.- Token-Controlled Public Key Encryption in the Standard Model.- Trapdoor Permutation Polynomials of ?/n? and Public Key Cryptosystems.- A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring.- Towards a DL-Based Additively Homomorphic Encryption Scheme.- Elliptic Curves and Applications.- Differential Properties of Elliptic Curves and Blind Signatures.- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation.- Database Security and Privacy.- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.- Efficient Negative Databases from Cryptographic Hash Functions.
Rare Book
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 29,00 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: moluna, Greven, Germania
Kartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007. Coverage in the 28 revised full papers presented includes intrusion detection, digital rights management, symmetric-key cryp. Codice articolo 4900211
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007. Coverage in the 28 revised full papers presented includes intrusion detection, digital rights management, symmetric-key cryptography, cryptographic protocols and schemes, identity-based schemes, cryptanalysis, DoS protection, software obfuscation, public-key cryptosystems, elliptic curves and applications and security issues in databases. 456 pp. Englisch. Codice articolo 9783540754954
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - The 10th Information Security Conference (ISC 2007) was held in Valpara so, Chile, October 9-12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004), Singapore (ISC 2005),and Greece (ISC 2006). This year the event wassponsored by the Univ- sidad T ecnica Federico Santa Mar a (Valpara so, Chile), the Support Center for AdvancedTelecommunicationsTechnologyResearch,Foundation,SCAT(Tokyo, Japan), Microsoft Corporation, and Yahoo! Research. Re ectingtheconference'sbroadscope,thisyear'smainProgramCommittee consisted of a relatively large number (49) of experts. Additionally, given the timely topic of cryptanalysis and design of hash functions and the NIST hash competition, the conference also featured a special Hash Subcommittee, chaired by Arjen Lenstra (EPFL and Bell Labs), as well as a panel on hashing, chaired by Bill Burr (NIST). The conference received 116 submissions, 29 of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paper was anonymously reviewed by at least three committee members. Codice articolo 9783540754954
Quantità: 1 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -The 10th Information Security Conference (ISC 2007) was held in Valparä so, Chile, October 9¿12, 2007. ISC is an annual international conference covering research in theory and applications of information security, aiming to attract high quality papers in all of its technical aspects. ISC was rst initiated as a workshop (ISW) in Japan in 1997, ISW 1999 was held in Malaysia and ISW 2000 in Australia. The name was changed to the current one when the conf- ence was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), the UK (ISC 2003), the USA (ISC 2004), Singapore (ISC 2005),and Greece (ISC 2006). This year the event wassponsored by the Univ- sidad T¿ ecnica Federico Santa Mar¿ a (Valparä so, Chile), the Support Center for AdvancedTelecommunicationsTechnologyResearch,Foundation,SCAT(Tok yo, Japan), Microsoft Corporation, and Yahoo! Research. Re ectingtheconference¿sbroadscope,thisyear¿smainProgramCommitte e consisted of a relatively large number (49) of experts. Additionally, given the timely topic of cryptanalysis and design of hash functions and the NIST hash competition, the conference also featured a special Hash Subcommittee, chaired by Arjen Lenstra (EPFL and Bell Labs), as well as a panel on hashing, chaired by Bill Burr (NIST). The conference received 116 submissions, 29 of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paper was anonymously reviewed by at least three committee members.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 456 pp. Englisch. Codice articolo 9783540754954
Quantità: 2 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783540754954_new
Quantità: Più di 20 disponibili
Da: Chiron Media, Wallingford, Regno Unito
Paperback. Condizione: New. Codice articolo 6666-IUK-9783540754954
Quantità: 10 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 1st edition. 436 pages. 9.00x6.00x1.00 inches. In Stock. Codice articolo x-3540754954
Quantità: 2 disponibili
Da: UK BOOKS STORE, London, LONDO, Regno Unito
Condizione: New. Brand New! Fast Delivery US Edition and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 7-10 days and we do have flat rate for up to 2LB. Extra shipping charges will be requested if the Book weight is more than 5 LB. This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability. Codice articolo CBS 9783540754954
Quantità: 1 disponibili
Da: URW Books Store, CASPER, WY, U.S.A.
Condizione: Brand New. Brand New! Fast Delivery, Delivery With In 7-10 working Day Only , USA Edition Original Edition. Excellent Quality, Printing In English Language, Quick delivery by FEDEX & DHL. USPS & UPS Act. Our courier service is not available at PO BOX& APO BOX. Ship from India & United States. Codice articolo CBSBOOKS36175
Quantità: 1 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar3113020176392
Quantità: Più di 20 disponibili