![]() |
Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier
ISBN: 9783642131899 / Angielski / Miękka / 712 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30 June 3, 2010. A total of 191 papers were received of which 188 were retained as valid submissions. These were each assigned to at least three Program Committee members and a total of 606 review reports were produced. The printed record of the reviews and extensive online discussions that followed would be almost as...
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques....
|
cena:
201,24 |
![]() |
Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers
ISBN: 9783642138577 / Angielski / Miękka / 385 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2002, theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996), Haifa, Israel(1997), Paris, France(1998), Rome, Italy(1999), NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006),...
Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2...
|
cena:
201,24 |
![]() |
Computer Networks: 17th Conference, Cn 2010, Ustron, Poland, June 15-19, 2010. Proceedings
ISBN: 9783642138607 / Angielski / Miękka / 359 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The continuous and intensive development of computer science results in the fast progress of computer networks. Computer networks, as well as the entire computer science ?eld, are subject to regular changes caused by the general development of technology, and also the in?uence of new computer science te- nology. This progress refers to the methods as well as the tools of designing and modelingcomputernetworks. Particularly, therangeofusingcomputernetworks permanently is extended thanks to the results of new research and new app- cations, which were not even taken into consideration in the...
The continuous and intensive development of computer science results in the fast progress of computer networks. Computer networks, as well as the enti...
|
cena:
201,24 |
![]() |
Model-Driven Risk Analysis: The Coras Approach
ISBN: 9783642123221 / Angielski / Twarda / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a...
The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security ri...
|
cena:
201,24 |
![]() |
Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers
ISBN: 9783642144950 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity, alsocalledunconditionalsecurity, where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are...
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Informat...
|
cena:
201,24 |
![]() |
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings
ISBN: 9783642146220 / Angielski / Miękka / 741 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of C- ifornia at Santa Barbara. The conference was held in Santa Barbara, Calif- nia, during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on Cryptographic Hardware and Embedded Systems). Zul?kar Ramzan served as the General Chair. The conference received 203 submissions. The quality of the submissions...
CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operati...
|
cena:
201,24 |
![]() |
Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures
ISBN: 9783540209553 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness. This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro,... Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactio... |
cena:
201,24 |
![]() |
Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings
ISBN: 9783642119248 / Angielski / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of CT-RSA. Since its conception, the CT-RSA conference has become a major avenue for publishing high-quality research papers. The RSA conference was held in San Francisco, California, during March 1-5, 2010. This year we received94 submissions. Eachpaper gotassignedto three ref- ees. Papers submitted by the members of the Program Committee got...
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf...
|
cena:
201,24 |
![]() |
Programming with Javascript: Algorithms and Applications for Desktop and Mobile Browsers: Algorithms and Applications for Desktop and Mobile Browsers
ISBN: 9780763780609 / Angielski / Miękka / 670 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Designed specifically for the CS-1 Introductory Programming Course, "Programming with JavaScript: Algorithms and Applications for Desktop and Mobile Browsers" introduces students to computer science and programming using a modern approach.
Designed specifically for the CS-1 Introductory Programming Course, "Programming with JavaScript: Algorithms and Applications for Desktop and Mobile B...
|
cena:
813,03 |
![]() |
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings
ISBN: 9783642140808 / Angielski / Miękka / 403 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the...
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research ...
|
cena:
201,24 |
![]() |
Transactions on Data Hiding and Multimedia Security V
ISBN: 9783642142970 / Angielski / Miękka / 129 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of... Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl... |
cena:
201,24 |
![]() |
Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings
ISBN: 9783642156502 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the...
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and...
|
cena:
201,24 |
![]() |
Identitätsdiebstahl Und Identitätsmissbrauch Im Internet: Rechtliche Und Technische Aspekte
ISBN: 9783642158322 / Niemiecki / Twarda / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identitatsdiebstahl und Identitatsmissbrauch im Internet sind eine ernste Bedrohung. Angriffe werden in der technischen Ausfuhrung und in der Wahl der Angriffsziele immer professioneller. Die Autoren untersuchen Fragen des Identitatsdiebstahls und Identitatsmissbrauchs aus technischer und rechtlicher Perspektive und leiten daraus Handlungsempfehlungen ab. Schwerpunkte sind die systematische Darstellung gegenwartiger Angriffe und kunftiger Entwicklungen, die Bedeutung des neuen Personalausweises, Strafbarkeit und Strafverfolgung sowie Haftungsfragen."
Identitatsdiebstahl und Identitatsmissbrauch im Internet sind eine ernste Bedrohung. Angriffe werden in der technischen Ausfuhrung und in der Wahl der...
|
cena:
489,08 |
![]() |
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings
ISBN: 9783642162794 / Angielski / Miękka / 279 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption. This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented we... |
cena:
201,24 |
![]() |
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings
ISBN: 9783642153167 / Angielski / Miękka / 471 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September...
|
cena:
201,24 |
![]() |
Security Engineering for Service-Oriented Architectures
ISBN: 9783642098475 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize security-critical applications for SOAs. In a second step, they apply the principles of model-driven security to SOAs.
Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize security-critical applications ...
|
cena:
201,24 |
![]() |
Global Initiatives to Secure Cyberspace: An Emerging Landscape
ISBN: 9781441935304 / Angielski / Miękka / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions....
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasi...
|
cena:
402,53 |
![]() |
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20
ISBN: 9781441934772 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
|
cena:
402,53 |
![]() |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings
ISBN: 9783642174544 / Angielski / Miękka / 467 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
|
cena:
201,24 |
![]() |
On the Move to Meaningful Internet Systems: Otm 2010: Confederated International Conferences: Coopis, Is, DOA and Odbase, Hersonissos, Crete, Greece,
ISBN: 9783642169489 / Angielski / Miękka / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. and ontologies, and CoopIS(CooperativeInformationSystems, since 1993), c- ering the application of these technologies in an enterprise context through, for example, work?owsystemsandknowledgemanagement. In2007theISworkshop (Information Security) was added to try cover also the speci?c issues of security in complex Internet-based information systems. Each of the main conferences speci?cally seeks high-quality contributions and encourages researchers to treat their respective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c)...
and ontologies, and CoopIS(CooperativeInformationSystems, since 1993), c- ering the application of these technologies in an enterprise context through...
|
cena:
201,24 |