• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

ISBN-13: 9783540308553 / Angielski / Miękka / 2005 / 428 str.

D. Feng; Dengguo Feng
Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Feng, Dengguo 9783540308553 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Information Security and Cryptology: First Sklois Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

ISBN-13: 9783540308553 / Angielski / Miękka / 2005 / 428 str.

D. Feng; Dengguo Feng
cena 201,72
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware, theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Computer Science
Computers > Operating Systems - General
Computers > Security - Cryptography & Encryption
Wydawca:
Springer
Seria wydawnicza:
Lecture Notes in Computer Science
Język:
Angielski
ISBN-13:
9783540308553
Rok wydania:
2005
Wydanie:
2005
Numer serii:
000013115
Ilość stron:
428
Waga:
0.61 kg
Wymiary:
23.39 x 15.6 x 2.26
Oprawa:
Miękka
Wolumenów:
01

Invited Talks.- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.- You Can Prove So Many Things in Zero-Knowledge.- Identity Based Cryptography.- Improvements on Security Proofs of Some Identity Based Encryption Schemes.- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme.- ID-Based Signature Scheme Without Trusted PKG.- Security Modelling.- Specifying Authentication Using Signal Events in CSP.- Modeling RFID Security.- Systems Security.- Enforcing Email Addresses Privacy Using Tokens.- Efficient Authentication of Electronic Document Workflow.- Signature Schemes.- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.- Efficient Group Signatures from Bilinear Pairing.- Enhanced Aggregate Signatures from Pairings.- Constructing Secure Proxy Cryptosystem.- Symmetric Key Mechanisms.- Towards a General RC4-Like Keystream Generator.- HCTR: A Variable-Input-Length Enciphering Mode.- The kth-Order Quasi-Generalized Bent Functions over Ring Z p .- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences.- Zero-Knowledge and Secure Computations.- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP.- An Improved Secure Two-Party Computation Protocol.- Threshold Cryptography.- Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.- ID-Based Threshold Unsigncryption Scheme from Pairings.- Intrusion Detection Systems.- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.- Protocol Cryptanalysis.- Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.- ECC Algorithms.- A Remark on Implementing the Weil Pairing.- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC.- Applications.- Key Management for Secure Overlay Multicast.- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN.- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault.- Secret Sharing.- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes.- New Methods to Construct Cheating Immune Multisecret Sharing Scheme.- Denial of Service Attacks.- Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation.- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks.

Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia