Information Security Applications (eBook, PDF)
8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
Redaktion: Sehun, Kim; Lee, Hyung-Woo; Yung, Moti
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Information Security Applications (eBook, PDF)
8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
Redaktion: Sehun, Kim; Lee, Hyung-Woo; Yung, Moti
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, in August 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on a wide range of subjects from secure systems to P2P security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 10.77MB
Andere Kunden interessierten sich auch für
- Information Security Applications (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Topics in Cryptology - CT-RSA 2007 (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)40,95 €
- Progress in Cryptology - INDOCRYPT 2008 (eBook, PDF)40,95 €
-
-
-
Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, in August 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on a wide range of subjects from secure systems to P2P security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 388
- Erscheinungstermin: 9. Januar 2008
- Englisch
- ISBN-13: 9783540775355
- Artikelnr.: 44228886
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 388
- Erscheinungstermin: 9. Januar 2008
- Englisch
- ISBN-13: 9783540775355
- Artikelnr.: 44228886
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Public Key Crypto Applications.- Universal ? T Pairing Algorithm over Arbitrary Extension Degree.- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.- Secret Signatures: How to Achieve Business Privacy Efficiently?.- Biometrics/Information Hiding.- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.- Geometrically Invariant Image Watermarking in the DWT Domain.- Secure Hardware.- Implementation of LSM-Based RBAC Module for Embedded System.- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.- Secure Systems.- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.- Detecting Motifs in System Call Sequences.- Wireless and Mobile Security.- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.- Breaking 104 Bit WEP in Less Than 60 Seconds.- Efficient Implementation of the Pairing on Mobilephones Using BREW.- Application Security/Secure Systems.- Security Analysis of MISTY1.- A Generic Method for Secure SBox Implementation.- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.- Access Control/DB Security.- Authorization Constraints Specification of RBAC.- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.- A Compositional Multiple Policies Operating System Security Model.- Smart Cards/Secure Systems.- Longer Randomly Blinded RSA KeysMay Be Weaker Than Shorter Ones.- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.- Anonymity and P2P Security.- Risk & Distortion Based K-Anonymity.- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.
Public Key Crypto Applications.- Universal ? T Pairing Algorithm over Arbitrary Extension Degree.- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.- Secret Signatures: How to Achieve Business Privacy Efficiently?.- Biometrics/Information Hiding.- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model.- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms.- Geometrically Invariant Image Watermarking in the DWT Domain.- Secure Hardware.- Implementation of LSM-Based RBAC Module for Embedded System.- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations.- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.- Secure Systems.- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.- Detecting Motifs in System Call Sequences.- Wireless and Mobile Security.- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.- Breaking 104 Bit WEP in Less Than 60 Seconds.- Efficient Implementation of the Pairing on Mobilephones Using BREW.- Application Security/Secure Systems.- Security Analysis of MISTY1.- A Generic Method for Secure SBox Implementation.- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.- Access Control/DB Security.- Authorization Constraints Specification of RBAC.- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk.- A Compositional Multiple Policies Operating System Security Model.- Smart Cards/Secure Systems.- Longer Randomly Blinded RSA KeysMay Be Weaker Than Shorter Ones.- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.- Anonymity and P2P Security.- Risk & Distortion Based K-Anonymity.- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System.- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.