Emerging Trends in Information and Communication Security (eBook, PDF)
International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings
Redaktion: Müller, Günter
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Emerging Trends in Information and Communication Security (eBook, PDF)
International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings
Redaktion: Müller, Günter
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 9.98MB
Andere Kunden interessierten sich auch für
- Privacy Enhancing Technologies (eBook, PDF)40,95 €
- Communications and Multimedia Security (eBook, PDF)40,95 €
- Secure Data Managment (eBook, PDF)40,95 €
- Recent Advances in Intrusion Detection (eBook, PDF)40,95 €
- Privacy Enhancing Technologies (eBook, PDF)40,95 €
- Privacy Enhancing Technologies (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 532
- Erscheinungstermin: 1. Juni 2006
- Englisch
- ISBN-13: 9783540346425
- Artikelnr.: 44127515
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 532
- Erscheinungstermin: 1. Juni 2006
- Englisch
- ISBN-13: 9783540346425
- Artikelnr.: 44127515
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Günter Müller is senior scientist for Biochemistry at Aventis Pharma Germany, Frankfurt am Main, and honorary lecturer for genetics at the University of Munich. He was born in Peissenberg (Germany) and studied anthropology, zoology, genetics and biochemistry at the Ludwig-Maximilians-University in Munich, finishing his PhD thesis under the supervision of R. Zimmermann in 1987. After post-doctoral fellowships at the universities of Ulm and Heidelberg, he joined the pharmaceutical industry in 1990 and received his habilitation at the University of Munich in 1996. He is interested in molecular mechanisms in both lower eukaryotes and mammalian cells, and their use as drug targets for metabolic disorders.
Multilateral Security.- Multilateral Security: Enabling Technologies and Their Evaluation.- Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems.- Security in Service-Oriented Computing.- Optimized Workflow Authorization in Service Oriented Architectures.- Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment.- A P2P Content Authentication Protocol Based on Byzantine Agreement.- Secure Mobile Applications.- Transitive Trust in Mobile Scenarios.- An Open, PKI-Based Mobile Payment System.- Secure Rejoining Scheme for Dynamic Sensor Networks.- Developing Provable Secure M-Commerce Applications.- Enterprise Privacy.- An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction.- Privacy-Preserving Decision Tree Mining Based on Random Substitutions.- Privacy, Identity, and Anonymity.- Policy-Based Integration of User and Provider-Sided Identity Management.- Privacy with Delegation of Rights by Identity Management.- A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System.- Revocable Anonymity.- Low Latency Anonymous Communication - How Long Are Users Willing to Wait?.- Security Engineering.- Security Engineering Using Problem Frames.- SecTOOL - Supporting Requirements Engineering for Access Control.- Possibilistic Information Flow Control in MAKS and Action Refinement.- Toward a Framework for Forensic Analysis of Scanning Worms.- A Comparison of Market Approaches to Software Vulnerability Disclosure.- Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples.- Security Policies.- Allowing State Changes in Specifications.- Field Access Analysis for Enforcing Access Control Policies.- Controlling Access toDocuments: A Formal Access Control Model.- How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security.- Security and Protocols.- Secure End-to-End Transport over SCTP.- An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.- Filtering for Private Collaborative Benchmarking.- Intrusion Detection.- On the Use of Word Networks to Mimicry Attack Detection.- Simplifying Signature Engineering by Reuse.- Redesign and Implementation of Evaluation Dataset for Intrusion Detection System.- Requirements of Information Reductions for Cooperating Intrusion Detection Agents.- Perspectives of Cryptographic Security.- Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age.- Kleptographic Attacks on E-Voting Schemes.- Visual Document Authentication Using Human-Recognizable Watermarks.
Multilateral Security.- Multilateral Security: Enabling Technologies and Their Evaluation.- Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems.- Security in Service-Oriented Computing.- Optimized Workflow Authorization in Service Oriented Architectures.- Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment.- A P2P Content Authentication Protocol Based on Byzantine Agreement.- Secure Mobile Applications.- Transitive Trust in Mobile Scenarios.- An Open, PKI-Based Mobile Payment System.- Secure Rejoining Scheme for Dynamic Sensor Networks.- Developing Provable Secure M-Commerce Applications.- Enterprise Privacy.- An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction.- Privacy-Preserving Decision Tree Mining Based on Random Substitutions.- Privacy, Identity, and Anonymity.- Policy-Based Integration of User and Provider-Sided Identity Management.- Privacy with Delegation of Rights by Identity Management.- A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System.- Revocable Anonymity.- Low Latency Anonymous Communication - How Long Are Users Willing to Wait?.- Security Engineering.- Security Engineering Using Problem Frames.- SecTOOL - Supporting Requirements Engineering for Access Control.- Possibilistic Information Flow Control in MAKS and Action Refinement.- Toward a Framework for Forensic Analysis of Scanning Worms.- A Comparison of Market Approaches to Software Vulnerability Disclosure.- Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples.- Security Policies.- Allowing State Changes in Specifications.- Field Access Analysis for Enforcing Access Control Policies.- Controlling Access toDocuments: A Formal Access Control Model.- How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security.- Security and Protocols.- Secure End-to-End Transport over SCTP.- An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.- Filtering for Private Collaborative Benchmarking.- Intrusion Detection.- On the Use of Word Networks to Mimicry Attack Detection.- Simplifying Signature Engineering by Reuse.- Redesign and Implementation of Evaluation Dataset for Intrusion Detection System.- Requirements of Information Reductions for Cooperating Intrusion Detection Agents.- Perspectives of Cryptographic Security.- Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age.- Kleptographic Attacks on E-Voting Schemes.- Visual Document Authentication Using Human-Recognizable Watermarks.