![]() |
Information Security Applications: 10th International Workshop, Wisa 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
ISBN: 9783642108372 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and...
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25-27, 2009. The workshop was ...
|
cena:
201,24 |
![]() |
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings
ISBN: 9783642106279 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi... |
cena:
201,24 |
![]() |
Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin
ISBN: 9783642106217 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated...
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The...
|
cena:
201,24 |
![]() |
Database Theory and Application: International Conference, Dta 2009, Held as Part of the Future Generation Information Technology Conference, Fgit 200
ISBN: 9783642105821 / Angielski / Miękka / 185 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
|
cena:
201,24 |
![]() |
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings
ISBN: 9783642104329 / Angielski / Miękka / 538 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
|
cena:
402,53 |
![]() |
Advances in Cryptology - Asiacrypt 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Ja
ISBN: 9783642103650 / Angielski / Miękka / 740 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during December 6-10, 2009. The conference was sponsored by the International - sociation for Cryptologic Research (IACR) in cooperation with the Technical Group on Information Security (ISEC) of the Institute of Electronics, Infor- tion and Communication Engineers (IEICE). ASIACRYPT 2009 was chaired by Eiji Okamoto and I had the honor of serving as the Program Chair. The conference received 300 submissions from which two papers were wi-...
ASIACRYPT 2009, the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo, Japan, during Decemb...
|
cena:
201,24 |
![]() |
Information Systems, Technology and Management
ISBN: 9783642120343 / Angielski / Miękka / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, held in Bangkok, Thailand, in March 2010.The 28 revised full papers presented together with 3 keynote lectures, 9 short papers, and 2 tutorial papers were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on information systems, information technology, information management, and applications.
This volume constitutes the refereed proceedings of the 4th International Conference on Information Systems, Technology and Management, ICISTM 2010, h...
|
cena:
402,53 |
![]() |
Cyber Security: Deterrence and It Protection for Critical Infrastructures
ISBN: 9783319022789 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
|
cena:
201,24 |
![]() |
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings
ISBN: 9783642133640 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This...
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli-...
|
cena:
201,24 |
![]() |
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 Hyderabad, India, June 21, 2010 Proceedings
ISBN: 9783642136009 / Angielski / Miękka / 183 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
|
cena:
201,24 |
![]() |
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings
ISBN: 9783642137389 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June...
|
cena:
201,24 |
![]() |
Trust and Trustworthy Computing: Third International Conference, Trust 2010, Berlin, Germany, June 21-23, 2010, Proceedings
ISBN: 9783642138683 / Angielski / Miękka / 441 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21 23, 2010. TRUST is a rapidly growing forum for research on the technical and soc- economic aspects of trustworthy infrastructures. TRUST provides an interdis- plinary forum for researchers, practitioners, and decision makers to explore new ideas and discuss experiences in building, designing, using, and understanding trustworthy computing systems. The third edition of TRUST welcomed manuscripts in two di?erent tracks:...
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel ...
|
cena:
201,24 |
![]() |
Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
ISBN: 9783642407789 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security...
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
|
cena:
201,24 |
![]() |
Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, Augu
ISBN: 9783642147111 / Angielski / Miękka / 323 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010.
The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks. This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, ...
|
cena:
201,24 |
![]() |
Towards Trustworthy Elections: New Directions in Electronic Voting
ISBN: 9783642129797 / Angielski / Miękka / 403 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade....
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology ca...
|
cena:
201,24 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th International Conference, Dimva 2010, Bonn, Germany, July 8-9, 2010, Proceeding
ISBN: 9783642142147 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2010, held in Bonn, Germany, in July 2010. This book features the papers that are organized in topical sections on host security, trends, vulnerabilities, intrusion detection and web security.
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2...
|
cena:
201,24 |
![]() |
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2
ISBN: 9783642142819 / Angielski / Twarda / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies andthepeopleresponsible for making decisions about them, designing, and implementing them scarcely consider those requirements, thereby potentially putting individuals privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may...
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain c...
|
cena:
201,24 |
![]() |
Transactions on Data Hiding and Multimedia Security V
ISBN: 9783642142970 / Angielski / Miękka / 129 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of... Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl... |
cena:
201,24 |
![]() |
Rc4 Stream Cipher and Its Variants
ISBN: 9781439831359 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute... RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive experti... |
cena:
881,59 |
![]() |
Trustworthy Global Computing: 5th International Symposium, Tgc 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers
ISBN: 9783642156397 / Angielski / Miękka / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Global computing refers to computation over "global computers," i.e., com- tational infrastructures available globally and able to provide uniform services with variable guarantees for communication, cooperation and mobility, resource usage, security policies and mechanisms, etc., with particular regard to explo- ing their universal scale and the programmability of their services. As the scope and computational power of such global infrastructures continue to grow, it - comes more and more important to develop methods, theories and techniques for trustworthy systems running on global...
Global computing refers to computation over "global computers," i.e., com- tational infrastructures available globally and able to provide uniform ser...
|
cena:
201,24 |