Lingua: Inglese
Editore: Springer Berlin / Heidelberg, 2001
ISBN 10: 3540417826 ISBN 13: 9783540417828
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Condizione: Good. *Price HAS BEEN REDUCED by 10% until Monday, May 11 (weekend SALE item)* 261 pp., Paperback, ex library, else text clean and binding tight. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 59,22
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 60,06
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,79
Quantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 59,73
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 73,58
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New. pp. 280.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 65,60
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Condizione: New. pp. xiv + 458 1st Edition.
Da: Revaluation Books, Exeter, Regno Unito
EUR 83,40
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 2006 edition. 472 pages. 9.00x6.00x1.00 inches. In Stock.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea Institute of Information Security and Cryptology (KIISC) and is being held at Dongguk University in Seoul, Korea from December 8 to 9, 2000. This conference aims at providing a forum for the presentation of new results in research, development, and application in information security and cryptology. This is also intended to be a place where research information can be exchanged. The Call for Papers brought 56 papers from 15 countries and 20 papers will be presented in ve sessions. As was the case last year the review process was totally blind and the anonymity of each submission was maintained. The 22 TPC members nally selected 20 top-quality papers for presentation at ICISC 2000. I am very grateful to the TPC members who devoted much e ort and time to reading and selecting the papers. We also thank the experts who assisted the TPC in evaluating various papers and apologize for not including their names here. Moreover, I would like to thank all the authors who submitted papers to ICISC 2000 and the authors of accepted papers for their preparation of came- ready manuscripts. Last but not least, I thank my student, Joonsuk Yu, who helped me during the whole process of preparation for the conference. I look forward to your participation and hope you will nd ICISC 2000 a truly rewarding experience.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2006
ISBN 10: 3540333541 ISBN 13: 9783540333548
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005. The 32 revised full papers presented together with two invited talks are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography.
Da: preigu, Osnabrück, Germania
EUR 50,25
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Information Security and Cryptology - ICISC 2005 | 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers | Dongho Won (u. a.) | Taschenbuch | xiv | Englisch | 2006 | Springer | EAN 9783540333548 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Da: preigu, Osnabrück, Germania
EUR 50,25
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Information Security and Cryptology - ICISC 2000 | Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings | Dongho Won | Taschenbuch | x | Englisch | 2001 | Springer | EAN 9783540417828 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 100,04
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Lingua: Inglese
Editore: Springer Berlin Heidelberg Mrz 2001, 2001
ISBN 10: 3540417826 ISBN 13: 9783540417828
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea Institute of Information Security and Cryptology (KIISC) and is being held at Dongguk University in Seoul, Korea from December 8 to 9, 2000. This conference aims at providing a forum for the presentation of new results in research, development, and application in information security and cryptology. This is also intended to be a place where research information can be exchanged. The Call for Papers brought 56 papers from 15 countries and 20 papers will be presented in ve sessions. As was the case last year the review process was totally blind and the anonymity of each submission was maintained. The 22 TPC members nally selected 20 top-quality papers for presentation at ICISC 2000. I am very grateful to the TPC members who devoted much e ort and time to reading and selecting the papers. We also thank the experts who assisted the TPC in evaluating various papers and apologize for not including their names here. Moreover, I would like to thank all the authors who submitted papers to ICISC 2000 and the authors of accepted papers for their preparation of came- ready manuscripts. Last but not least, I thank my student, Joonsuk Yu, who helped me during the whole process of preparation for the conference. I look forward to your participation and hope you will nd ICISC 2000 a truly rewarding experience. 276 pp. Englisch.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, Springer Berlin Heidelberg Apr 2006, 2006
ISBN 10: 3540333541 ISBN 13: 9783540333548
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005. The 32 revised full papers presented together with two invited talks are organized in topical sections on key management and distributed cryptography, authentication and biometrics, provable security and primitives, system and network security, block ciphers and stream ciphers, efficient implementations, digital rights management, and public key cryptography. 476 pp. Englisch.
Da: Majestic Books, Hounslow, Regno Unito
EUR 78,34
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 280 Illus.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 79,09
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 280.
Da: Majestic Books, Hounslow, Regno Unito
EUR 90,53
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. xiv + 458 Illus.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2001
ISBN 10: 3540417826 ISBN 13: 9783540417828
Da: moluna, Greven, Germania
EUR 48,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea Institute of Information Security and Cryptology (KIISC) and is being held at Dongguk Universi.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2006
ISBN 10: 3540333541 ISBN 13: 9783540333548
Da: moluna, Greven, Germania
EUR 48,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Postproceedings of the 8th International Conference on Information Security and Cryptology, ICISC 2005Includes 32 revised full papers presented together with two invited talksThe papers are organized in topical sections on key management an.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 92,16
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. xiv + 458.
Lingua: Inglese
Editore: Springer, Springer Mär 2001, 2001
ISBN 10: 3540417826 ISBN 13: 9783540417828
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea Institute of Information Security and Cryptology (KIISC) and is being held at Dongguk University in Seoul, Korea from December 8 to 9, 2000. This conference aims at providing a forum for the presentation of new results in research, development, and application in information security and cryptology. This is also intended to be a place where research information can be exchanged. The Call for Papers brought 56 papers from 15 countries and 20 papers will be presented in ve sessions. As was the case last year the review process was totally blind and the anonymity of each submission was maintained. The 22 TPC members nally selected 20 top-quality papers for presentation at ICISC 2000. I am very grateful to the TPC members who devoted much e ort and time to reading and selecting the papers. We also thank the experts who assisted the TPC in evaluating various papers and apologize for not including their names here. Moreover, I would like to thank all the authors who submitted papers to ICISC 2000 and the authors of accepted papers for their preparation of came- ready manuscripts. Last but not least, I thank my student, Joonsuk Yu, who helped me during the whole process of preparation for the conference. I look forward to your participation and hope you will nd ICISC 2000 a truly rewarding experience.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 276 pp. Englisch.
Lingua: Inglese
Editore: Springer, Springer Apr 2006, 2006
ISBN 10: 3540333541 ISBN 13: 9783540333548
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Invited Talks.- National Security, Forensics and Mobile Communications.- Information Security as Interdisciplinary Science Based on Ethics.- Key Management and Distributed Cryptography.- A Timed-Release Key Management Scheme for Backward Recovery.- Property-Based Broadcast Encryption for Multi-level Security Policies.- Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption.- Authentication and Biometrics.- An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image.- Trust Management for Resilient Wireless Sensor Networks.- Improvements to Mitchell's Remote User Authentication Protocol.- Efficient Authenticators with Application to Key Exchange.- Provable Security and Primitives.- Benes and Butterfly Schemes Revisited.- Relative Doubling Attack Against Montgomery Ladder.- Improved Collision Attack on MD4 with Probability Almost 1.- Finding Collision on 45-Step HAS-160.- System/Network Security.- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.- The Dilemma of Covert Channels Searching.- A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.- Foundations of Attack Trees.- Block/Stream Ciphers (I).- An Algebraic Masking Method to Protect AES Against Power Attacks.- Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.- Integral Cryptanalysis of Reduced FOX Block Cipher.- Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.- Block/Stream Ciphers (II).- Cryptanalysis of Sfinks.- Weaknesses of COSvd (2,128) Stream Cipher.- Expanding Weak PRF with Small Key Size.- On Linear Systems of Equations with Distinct Variables and Small Block Size.- Efficient Implementations.- An FPGA Implementation of CCM Mode UsingAES.- New Architecture for Multiplication in GF(2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.- An Efficient Design of CCMP for Robust Security Network.- Digital Rights Management.- Software-Based Copy Protection for Temporal Media During Dissemination and Playback.- Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme.- Public Key Cryptography.- Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.- An Efficient Static Blind Ring Signature Scheme.- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.- Yet Another Forward Secure Signature from Bilinear Pairings.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 476 pp. Englisch.