• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings

ISBN-13: 9783642341281 / Angielski / Miękka / 2012 / 506 str.

Tat Wing Chim; Tsz Hon Yuen
Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings Chim, Tat Wing 9783642341281 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings

ISBN-13: 9783642341281 / Angielski / Miękka / 2012 / 506 str.

Tat Wing Chim; Tsz Hon Yuen
cena 201,72
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Information Theory
Computers > Programming - Algorithms
Computers > Security - Cryptography & Encryption
Wydawca:
Springer
Seria wydawnicza:
Lecture Notes in Computer Science / Security and Cryptology
Język:
Angielski
ISBN-13:
9783642341281
Rok wydania:
2012
Wydanie:
2012
Numer serii:
000379702
Ilość stron:
506
Waga:
0.70 kg
Wymiary:
22.86 x 15.24 x 2.79
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Audio Steganalysis Based on Lossless Data-Compression Techniques.- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.- Impact of the Revocation Service in PKI Prices.- Cryptanalysis of Multi-Prime RSA with Small Prime Difference.- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.- Improved Related-Key Differential Attacks on Reduced-Round LBlock.- Countermeasures on Application Level Low-Rate Denial-of-Service Attack.- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.- Group Behavior Metrics for P2P Botnet Detection.- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.- Perfect Ambiguous Optimistic Fair Exchange.- Privacy-Preserving Noisy Keyword Search in Cloud Computing.- Forward Secure Attribute-Based Signatures.- On Constant-Round Precise Zero-Knowledge.- Outsourcing Encryption of Attribute-Based Encryption with MapReduce.- Security Enhancement of Identity-Based Identification with Reversibility.- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.- Permission-Based Abnormal Application Detection for Android.- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine.- A Generic Approach for Providing Revocation Support in Secret Handshake.- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.- Exploring Mobile Proxies for Better Password Authentication.-  On Security of Universal Hash Function Based Multiple Authentication.- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack.- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.- Comparison between Side-Channel Analysis Distinguishers.- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition.- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in

Internet Explorer.- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance.- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography.- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.- Location Privacy Policy Management System.- Privacy Protection in Social Networks Using l-Diversity.- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.- A Key Sharing Fuzzy Vault Scheme.- A New Version of McEliece PKC Based on Convolutional Codes.- Flexible Attribute-Based Encryption.- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.- A Comparative Study of Malware Family Classification.- A Fine-Grained Classification Approach for the Packed Malicious Code.

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012.
The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia