Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings
ISBN: 9783540770237 / Angielski / Miękka / 894 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijing, China, in December 2007. The papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, energy efficiency, data processing, self-organization and synchronization, deployment and application, as well as security. This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijin... |
|
cena:
382,84 zł |
Progress in Cryptology - Indocrypt 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings
ISBN: 9783540770251 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, ... |
|
cena:
191,40 zł |
Security Protocols: 13th International Workshop, Cambridge, Uk, April 20-22, 2005, Revised Selected Papers
ISBN: 9783540771555 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was The systemlikes youandwants to be yourfriend. Security is usually seen as making...
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After tha...
|
|
cena:
191,40 zł |
Cryptography and Coding: 11th Ima International Conference, Cirencester, Uk, December 18-20, 2007, Proceedings
ISBN: 9783540772712 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation. This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in Dece... |
|
cena:
191,40 zł |
Selected Areas in Cryptography
ISBN: 9783540773597 / Angielski / Miękka / 426 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the University of Ottawa. Previous workshops were held at Queen s University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of Waterloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), and Conc- dia University in Montreal (2006). The intent of the workshop is to provide a stimulating atmosphere where researchersin cryptology can...
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the Universit...
|
|
cena:
191,40 zł |
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarbo
ISBN: 9783540773658 / Angielski / Miękka / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http: //fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http: //www. ifca. ai/), was held in Tobago, February 12 15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography,...
The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http: //fc07. ifca. ai), organized by the International Financ...
|
|
cena:
191,40 zł |
Medical Biometrics
ISBN: 9783540774105 / Angielski / Miękka / 342 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The past decade has seen a rapid growth in the demand for the usage of behavioral and physiological characteristics of humans for e-security and forensics applications. The significant advances in the biometrics techniques are increasingly incorporated in a number of other applications. In this context, medicine has emerged as the largest and most promising area. Medical biometrics primarily refers to the usage of beh- ioral and physiological characteristics of humans for medical diagnosis and body care. Thus the goal of medical biometrics is to explore solutions to the open problems in...
The past decade has seen a rapid growth in the demand for the usage of behavioral and physiological characteristics of humans for e-security and foren...
|
|
cena:
191,40 zł |
OS X Exploits and Defense
ISBN: 9781597492546 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is... Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. Howeve... |
|
cena:
241,20 zł |
Netcat Power Tools
ISBN: 9781597492577 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files,...
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Dat...
|
|
cena:
228,18 zł |
State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures
ISBN: 9783540654742 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer...
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of c...
|
|
cena:
191,40 zł |
Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings
ISBN: 9783540666950 / Angielski / Miękka / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Information Security Workshop, ISW'99, held in Kuala Lumpur, Malaysia in November 1999.The 23 revised full papers presented were carefully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkability; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and data; key recovery and electronic voting; and digital signatures.
This book constitutes the refereed proceedings of the Second International Information Security Workshop, ISW'99, held in Kuala Lumpur, Malaysia in No...
|
|
cena:
191,40 zł |
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
ISBN: 9780387776255 / Angielski / Twarda / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has typically been on the bottom line: driving down system-wide error rates. In doing so, powerful recognition algorithms have been developed for a number of biometric modalities. These algorithms operate exceedingly well under test conditions. ...Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practiti... |
|
cena:
574,29 zł |
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
ISBN: 9783540226666 / Angielski / Miękka / 462 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004. The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication and signatures.
This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in... |
|
cena:
191,40 zł |
Topics in Cryptology - CT-RSA 2001: The Cryptographer's Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
ISBN: 9783540418986 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You are holding the rst in a hopefully long and successful series of RSA Cr- tographers' Track proceedings. The Cryptographers' Track (CT-RSA) is one of the many parallel tracks of the yearly RSA Conference. Other sessions deal with government projects, law and policy issues, freedom and privacy news, analysts' opinions, standards, ASPs, biotech and healthcare, nance, telecom and wireless security, developers, new products, implementers, threats, RSA products, VPNs, as well as cryp- graphy and enterprise tutorials. RSA Conference 2001 is expected to continue the tradition and remain the...
You are holding the rst in a hopefully long and successful series of RSA Cr- tographers' Track proceedings. The Cryptographers' Track (CT-RSA) is one ...
|
|
cena:
191,40 zł |
Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security: International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21-23, 2001 Proceedings
ISBN: 9783540421030 / Angielski / Miękka / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.
The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography:... This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Syst...
|
|
cena:
287,12 zł |
Cryptographic Hardware and Embedded Systems - CHES 2001: Third International Workshop, Paris, France, May 14-16, 2001 Proceedings
ISBN: 9783540425212 / Angielski / Miękka / 418 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst two CHES Workshops were held in Massachusetts, and this was the ?rst Workshop to be held in Europe. There was a large number of submissions this year, and in response the technical program was extended to 2 1/2 days. As is evident by the papers in these proceedings, many excellent submissions were made. Selecting the papers for this year's CHES was not an easy task, and weregretthatwehadtorejectseveralveryinterstingpapersduetotheac l kof time. There were 66 submitted...
These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst two CHES Workshops were held in Ma...
|
|
cena:
191,40 zł |
Foundations of Security Analysis and Design: Tutorial Lectures
ISBN: 9783540428961 / Angielski / Miękka / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September.
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, ...
|
|
cena:
191,40 zł |
Topics in Cryptology - CT-RSA 2002: The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings
ISBN: 9783540432241 / Angielski / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program...
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly ...
|
|
cena:
191,40 zł |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
ISBN: 9783540255215 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, Germany in April 2005.The 14 revised full papers and 3 revised short papers presented together with abstracts of 5 invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on smart devices and applications, authentication, privacy and anonymity, and access control and information flow.
This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, G...
|
|
cena:
191,40 zł |
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
ISBN: 9783540404101 / Angielski / Miękka / 222 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed are DES implementation for DRM applications, cryptographic attacks, industrial challenges, public key broadcast encryption, fingerprinting, copy-prevention techniques, copyright limitations, content protection, watermarking systems,...
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002... |
|
cena:
191,40 zł |