![]() |
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings
ISBN: 9783540709350 / Angielski / Miękka / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment. This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in Februa... |
cena:
402,53 |
![]() |
Pervasive Computing: 5th International Conference, Pervasive 2007, Toronto, Canada, May 13-16, 2007, Proceedings
ISBN: 9783540720362 / Angielski / Miękka / 374 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, held in Toronto, Canada in May 2007. The 21 revised full papers are organized in topical sections on reaching out, context and its application, security and privacy, understanding use, sensing, as well as finding and positioning. This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, held in Toronto, Canada ... |
cena:
201,24 |
![]() |
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop,
ISBN: 9783540723530 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin-...
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- ...
|
cena:
201,24 |
![]() |
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S
ISBN: 9783540725398 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniqu... |
cena:
201,24 |
![]() |
Wired/Wireless Internet Communications: 5th International Conference, WWIC 2007 Coimbra, Portugal, May 23-25, 2007 Proceedings
ISBN: 9783540726944 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. WWIC 2007 was organized by the University of Coimbra, Portugal, and it was the fifth event of a series of International Conferences on Wired/Wireless Internet Communications, addressing research topics such as the design and evaluation of protocols, the dynamics of the integration, the performance trade-offs, the need for new performance metrics, and cross-layer interactions. Previous events were held in Berne (Switzerland) in 2006, Xanthi (Greece) in 2005, Frankfurt (Germany) in 2004, and Las Vegas (USA) in 2002. As in 2005 and 2006, WWIC was selected as the official conference by COST...
WWIC 2007 was organized by the University of Coimbra, Portugal, and it was the fifth event of a series of International Conferences on Wired/Wireless ...
|
cena:
201,24 |
![]() |
Transactions on Data Hiding and Multimedia Security II
ISBN: 9783540730910 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of... Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl... |
cena:
201,24 |
![]() |
Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers
ISBN: 9783540741237 / Angielski / Miękka / 402 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels. This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July... |
cena:
201,24 |
![]() |
Trust, Privacy and Security in Digital Business: 4th International Conference, Trustbus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
ISBN: 9783540744085 / Angielski / Miękka / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments. This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 paper... |
cena:
201,24 |
![]() |
Trustworthy Global Computing
ISBN: 9783540753339 / Angielski / Miękka / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC 2006, held in Lucca, Italy, in November 2006. The 14 revised papers presented together with two keynote lectures were carefully reviewed and selected from 32 submissions. The book starts off with activity reviews of four FP6 programmes of the European Union: Aeolus, Mobius, Sensoria, and Catnets. This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC 2006, held in Lucca, It... |
cena:
201,24 |
![]() |
Privacy Enhancing Technologies
ISBN: 9783540755500 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held... |
cena:
201,24 |
![]() |
E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers
ISBN: 9783540759928 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005. The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing. This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005. The... |
cena:
201,24 |
![]() |
Secure Integrated Circuits and Systems
ISBN: 9780387718279 / Angielski / Twarda / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed,... On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the ... |
cena:
402,53 |
![]() |
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures
ISBN: 9783540748090 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research gro... |
cena:
201,24 |
![]() |
Advances in Cryptology - Asiacrypt 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching,
ISBN: 9783540768999 / Angielski / Miękka / 604 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was...
ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the Int...
|
cena:
402,53 |
![]() |
Security in Wireless Mesh Networks
ISBN: 9780849382505 / Angielski / Twarda / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include... Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
|
cena:
612,21 |
![]() |
Insider Attack and Cyber Security: Beyond the Hacker
ISBN: 9780387773216 / Angielski / Twarda / 223 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats,... Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial i... |
cena:
402,53 |
![]() |
Trusted Computing Systeme: Konzepte Und Anforderungen
ISBN: 9783540764090 / Niemiecki / Twarda / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Der Begriff Trusted Computing umschreibt eine Reihe neuer Ansatze zur Verbesserung der Computersicherheit durch den Aufbau von Computersystemen aus vertrauenswurdigen Hardware- und Softwarekomponenten. Das Buch liefert erstmals einen umfassenden Uberblick uber die unterschiedlichen Konzepte des Trusted Computing und ermoglicht dadurch einen einfachen Einstieg in das komplexe Thema. Verfugbare Umsetzungen verschiedener Trusted-Computing-Konzepte sowie deren Probleme und Grenzen werden aufbauend auf die Grundlagen dargestellt. Uber die Beschreibung des Trusted Platform Modules (TPM)... Der Begriff Trusted Computing umschreibt eine Reihe neuer Ansatze zur Verbesserung der Computersicherheit durch den Aufbau von Computersystemen aus... |
cena:
112,84 |
![]() |
Advances in Computer Science - Asian 2007. Computer and Network Security: 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, P
ISBN: 9783540769279 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. Covering all current aspects of computer and network security, the papers are organized in topical sections on program security, computer security, access control, protocols, intrusion detection, network security, and safe execution. This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. C... |
cena:
201,24 |
![]() |
Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings
ISBN: 9783540770237 / Angielski / Miękka / 894 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijing, China, in December 2007. The papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, energy efficiency, data processing, self-organization and synchronization, deployment and application, as well as security. This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijin... |
cena:
402,53 |
![]() |
Progress in Cryptology - Indocrypt 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings
ISBN: 9783540770251 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, ... |
cena:
201,24 |