Da
GreatBookPrices, Columbia, MD, U.S.A.
Valutazione del venditore 5 su 5 stelle
Venditore AbeBooks dal 6 aprile 2009
Codice articolo 5905459-n
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
Contenuti: Trusted third parties for secure electronic commerce — Are they needed.- Prospectives for modelling trust in information security.- Analysis and implementation of a formal authorization policy design approach.- An approach to dynamic domain and type enforcement.- Purpose-oriented access control model in object-based systems.- User Access Domain Management System-ADAMS.- Revocation of unread e-mail in an untrusted network.- Security issues in asynchronous transfer mode.- A method to implement a denial of service protection base.- ProtectOS: Operating system and hardware support for small objects.- Practical memory checkers for stacks, queues and deques.- Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields.- A new hash function based on block cipher.- New lower bounds on nonlinearity and a class of highly nonlinear functions.- On the security of self-synchronous ciphers.- Inefficiency of variant characteristics for substitution-permutation networks with position permutations.- Secret sharing with reusable polynomials.- A message authentication code based on latin squares.- Characterization of (k, n) multi-receiver authentication.- Cryptanalysis of adaptive arithmetic coding encryption schemes.- Fast correlation attacks and multiple linear approximations.- Verifiable escrowed signature.- Democratic key escrow scheme.- Design and analyses of two basic protocols for use in TTP-based Key escrow.- Protection of data and delegated keys in digital distribution.- New micropayment schemes based on Pay Words.- On key agreement and conference key agreement.- Identity-based and self-certified key-exchange protocols.- Enabling technology for the trading of MPEG-encoded Video.- Image distribution method with embedded identifier scheme for copyright protection.
Titolo: Information Security and Privacy : Second ...
Casa editrice: Springer
Data di pubblicazione: 1997
Legatura: Brossura
Condizione: New
Da: Zubal-Books, Since 1961, Cleveland, OH, U.S.A.
Condizione: Good. 337 pp., Paperback, ex library, else text clean and binding tight. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country. Codice articolo ZB717210
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP 97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion i. Codice articolo 4896250
Quantità: Più di 20 disponibili
Da: preigu, Osnabrück, Germania
Taschenbuch. Condizione: Neu. Information Security and Privacy | Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings | Vijav Varadharajan (u. a.) | Taschenbuch | xiii | Englisch | 1997 | Springer | EAN 9783540632320 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu Print on Demand. Codice articolo 101931506
Quantità: 5 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar3113020172893
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. 356 pp. Englisch. Codice articolo 9783540632320
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. Codice articolo 9783540632320
Quantità: 1 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 356 pp. Englisch. Codice articolo 9783540632320
Quantità: 1 disponibili
Da: Chiron Media, Wallingford, Regno Unito
PF. Condizione: New. Codice articolo 6666-IUK-9783540632320
Quantità: 10 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783540632320_new
Quantità: Più di 20 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. 356 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Codice articolo 5825428
Quantità: 1 disponibili