• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Information Security and Cryptoloy - ICISC 2008: 11th International Conference Seoul, Korea, December 3-5, 2008 Revised Selected Papers » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Information Security and Cryptoloy - ICISC 2008: 11th International Conference Seoul, Korea, December 3-5, 2008 Revised Selected Papers

ISBN-13: 9783642007293 / Angielski / Miękka / 2009 / 433 str.

Pil Joong Lee
Information Security and Cryptoloy - ICISC 2008: 11th International Conference Seoul, Korea, December 3-5, 2008 Revised Selected Papers Lee, Pil Joong 9783642007293 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Information Security and Cryptoloy - ICISC 2008: 11th International Conference Seoul, Korea, December 3-5, 2008 Revised Selected Papers

ISBN-13: 9783642007293 / Angielski / Miękka / 2009 / 433 str.

Pil Joong Lee
cena 201,72 zł
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

ICISC 2008, the 11th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 3-5, 2008. It was or- nized by the Korea Institute of Information Security and Cryptology (KIISC). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of infor- tion security and cryptology. It also served as a place for research information exchange. The conference received131submissions from28 countries, coveringall areas of information security and cryptology. The review and selection processes were carried out in two stages by the Program Committee (PC) of 62 prominent researchers via online meetings, using the We-Submission-and-Review software written by Shai Halevi, IBM. First, at least three PC members blind-reviewed each paper, and papers co-authored by the PC members were reviewed by at least ?ve PC members. Second, individual review reports were revealed to PC members, followedbydetailedinteractivediscussiononeachpaper. Throughthis process, thePC?nallyselected26papersfrom14countries. Theacceptancerate was 19. 8%. The authors of selected papers had a few weeks to prepare for their ?nal versions based on the comments received from more than 136 external reviewers. These revised papers were not subject to editorial review and the authors bear full responsibility for their contents. The conference featured one tutorial and two invited talks. The tutorial was given by Masayuki Abe from NTT. The invited speakers for two talks were Vincent Rijmen from K. U. L. & Graz University of Tech and Jong-Deok Choi from Samsung Electronics.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Business & Economics > Economics - General
Computers > Operating Systems - General
Wydawca:
Springer
Seria wydawnicza:
Lecture Notes in Computer Science / Security and Cryptology
Język:
Angielski
ISBN-13:
9783642007293
Rok wydania:
2009
Wydanie:
2009
Numer serii:
000013115
Ilość stron:
433
Waga:
0.68 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

Public Key Encryption.- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.- Distributed Attribute-Based Encryption.- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.- Simple Algorithms for Computing a Sequence of 2-Isogenies.- Key Management and Secret Sharing.- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.- Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images.- Privacy and Digital Rights.- The Swiss-Knife RFID Distance Bounding Protocol.- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.- Anonymous Fingerprinting for Predelivery of Contents.- Instruction Set Limitation in Support of Software Diversity.- Digital Signature and Voting.- Non-interactive Identity-Based DNF Signature Scheme and Its Extensions.- How to Balance Privacy with Authenticity.- Efficient Vote Validity Check in Homomorphic Electronic Voting.- Side Channel Attack.- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.- Novel PUF-Based Error Detection Methods in Finite State Machines.- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.- Hash and MAC.- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs.- Extended Models for Message Authentication.- A Preimage Attack for 52-Step HAS-160.- Primitives and Foundations.- Essentially Optimal Universally Composable Oblivious Transfer.- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.- Proving a Shuffle Using Representations of the Symmetric Group.- On Formal Verification of Arithmetic-Based Cryptographic Primitives.- Block and Stream.- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent.- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis.- Higher Order Differential Attacks on Reduced-Round MISTY1.

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia