• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Lecture Notes in Computer Science / Security and Cryptology

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC
 
Towards Trustworthy Elections: New Directions in Electronic Voting

David Chaum; Markus Jakobsson; Ronald L. Rivest
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade....
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology ca...
cena: 201,72
 
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings

Ron Steinfeld; Philip Hawkes
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the...
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research ...
cena: 201,72
 
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th International Conference, Dimva 2010, Bonn, Germany, July 8-9, 2010, Proceeding

Christian Kreibich; Marko Jahnke
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2010, held in Bonn, Germany, in July 2010. This book features the papers that are organized in topical sections on host security, trends, vulnerabilities, intrusion detection and web security.
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2...
cena: 201,72
 
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings

Sokratis Katsikas; Javier Lopez; Miguel Soriano
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30-31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this 'information...
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bil...
cena: 201,72
 
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28,

Alessandro Armando; Gavin Lowe
ThisvolumecontainstheworkshopproceedingsofARSPA-WITS2010, theJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, held during March 27 28, 2010 in Paphos (Cyprus). ARSPA-WITS2010o?eredaforumfordiscussingnewresultsintheoriesofc- putersecurity, openquestionsandfundamentalconcernsaboutexistingtheories, and issues related to the development and application of automated reas- ing techniques and tools for the formal speci?cation and analysis of security protocols. There were 28 submissions. All the submissions were thoroughly evaluated on the...
ThisvolumecontainstheworkshopproceedingsofARSPA-WITS2010, theJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Th...
cena: 311,25
 
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings

Swee-Huay Heng; Kaoru Kurosawa
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented we...
cena: 201,72
 
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009, Revised Selected Papers

Feng Bao; Moti Yung; Dongdai Lin
The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of...
The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information Secur...
cena: 201,72
 
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings

Juan A. Garay; Roberto De Prisco
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September...
cena: 201,72
 
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings

Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was...
The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the internation...
cena: 403,47
 
Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings

Somesh Jha; Robin Sommer; Christian Kreibich
This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottawa, Canada, in September 2010. The 24 revised full papers presented together with 15 revised poster papers were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on network protection, high performance, malware detection and defence, evaluation, forensics, anomaly detection as well as web security.
This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottaw...
cena: 201,72
ilość książek w kategorii: 248
Pierwsza Podprzednia  7  8  9  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia