- 5 Results
Lowest price: € 59.49, highest price: € 85.19, average price: € 66.09
1
Order
at Thalia.ch
CHF 93.40
(aprox. € 85.19)
Shipment: € 0.001
OrderSponsored link
Kanta Matsuura#Eiichiro Fujisaki:

Advances in Information and Computer Security - new book

2008, ISBN: 9783540895985

This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan, in November 2008. The 18 revised full papers presented t… More...

  - No. 44258497 Shipping costs:, , CH (EUR 0.00)
2
Advances in Information and Computer Security - Kanta Matsuura; Eiichiro Fujisaki
Order
at Springer.com
€ 59.49
OrderSponsored link

Kanta Matsuura; Eiichiro Fujisaki:

Advances in Information and Computer Security - new book

ISBN: 9783540895985

Computer Science; Systems and Data Security; Operating Systems; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis… More...

  - Shipping costs:zzgl. Versandkosten, plus shipping costs
3
Advances in Information and Computer Security als eBook Download von
Order
at Hugendubel.de
€ 60.99
OrderSponsored link
Advances in Information and Computer Security als eBook Download von - new book

2008

ISBN: 9783540895985

Advances in Information and Computer Security:Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings Advances in Information and Computer S… More...

  - No. 25412079 Shipping costs:zzgl. Versandkosten, plus shipping costs
4
Order
at eBook.de
€ 60.99
OrderSponsored link
Advances in Information and Computer Security - new book

2008, ISBN: 9783540895985

Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27,… More...

  - No. 25412079 Shipping costs:zzgl. Versandkosten, plus shipping costs
5
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings - Luca Varadi
Order
at hive.co.uk
£ 53.54
(aprox. € 63.79)
OrderSponsored link
Luca Varadi:
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings - new book

2008, ISBN: 9783540895985

; PDF; Computing > Computer security, Springer Fachmedien Wiesbaden

No. 9783540895985. Shipping costs:Instock, Despatched same working day before 3pm, zzgl. Versandkosten., plus shipping costs

1As some platforms do not transmit shipping conditions to us and these may depend on the country of delivery, the purchase price, the weight and size of the item, a possible membership of the platform, a direct delivery by the platform or via a third-party provider (Marketplace), etc., it is possible that the shipping costs indicated by find-more-books.com / find-more-books.com do not correspond to those of the offering platform.

Bibliographic data of the best matching book

Details of the book

Details of the book - Advances in Information and Computer Security


EAN (ISBN-13): 9783540895985
Publishing year: 2008
Publisher: Kanta Matsuura#Eiichiro Fujisaki

Book in our database since 2016-03-12T22:18:40-05:00 (New York)
Detail page last modified on 2021-11-25T11:31:34-05:00 (New York)
ISBN/EAN: 9783540895985

ISBN - alternate spelling:
978-3-540-89598-5
Alternate spelling and related search-keywords:
Book title: information security, november 2008


Information from Publisher

Author: Kanta Matsuura; Eiichiro Fujisaki
Title: Lecture Notes in Computer Science; Security and Cryptology; Advances in Information and Computer Security - Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings
Publisher: Springer; Springer Berlin
299 Pages
Publishing year: 2008-11-23
Berlin; Heidelberg; DE
Language: English
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 299 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Computersicherheit; Verstehen; access control; anomaly detection; authentication; behavior profiling; biometric data; certification; computer security; cryptanalysis; cryptographic protocols; data security; dynamic XML; group signature; information leakage; information s; security; algorithm analysis and problem complexity; C; Data and Information Security; Operating Systems; IT Operations; Computers and Society; Computer Communication Networks; Algorithms; Computer Science; Netzwerksicherheit; Betriebssysteme; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Netzwerk-Hardware; Algorithmen und Datenstrukturen; BC

Cryptography.- On Generating Elements of Orders Dividing p 2k ±p k ?+?1.- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.- Remarks on the Attack of Fouque et al. against the ?IC Scheme.- Signature and Signcryption.- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.- Signcryption Scheme in Multi-user Setting without Random Oracles.- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices.- Software Security.- The Superdiversifier: Peephole Individualization for Software Protection.- Detecting Java Theft Based on Static API Trace Birthmark.- Online Network Forensics for Automatic Repair Validation.- Return Value Predictability Profiles for Self–healing.- Privacy Protection and Contents Protection.- Involuntary Information Leakage in Social Network Services.- Privacy Preserving Computations without Public Key Cryptographic Operation.- A Novel Framework for Watermarking: The Data-Abstracted Approach.- Invited Talk.- The Elliptic Curve Discrete Logarithm Problem: State of the Art.- Authentication and Access Control.- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication.- Analysis of a Biometric Authentication Protocol for Signature Creation Application.- Efficient Secure Labeling Method under Dynamic XML Data Streams.- Implementation.- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems.- The Long-Short-Key Primitive and Its Applications to Key Security.

< to archive...