This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.
The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 526 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Artikel-Nr. 7496921
Anzahl: 4 verfügbar
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Artikel-Nr. ABNR-77219
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 1st edition. 504 pages. 9.00x6.00x1.25 inches. In Stock. Artikel-Nr. x-3540858849
Anzahl: 2 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -paperwasanonymouslyreviewedbyatleastthreecommitteemembers.Inorderto encourageandpromotestudentparticipation,theISC2008ProgramCommittee selected three student-coauthored papers for the Best Student Paper award,one fromeachregion:Asia,Europe,andtheAmericas.Thepaperswere,respectively, ¿Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family,¿ bySomitraSanadhyaandPalashSarkar(IndianStatisticalInstitute,India),¿C- lisions for RC4-Hash,¿ by Sebastiaan Indesteege and Bart Preneel (Katholieke UniversiteitLeuven,Belgium),and¿ProxyRe-signaturesintheStandardModel,¿ byShermanS.M. Chow(New YorkUniversity,USA) andRaphaelPhan(Lou- borough University, UK). The program also included invited speeches by Doug Tygar(UC Berkeley,USA) andTatsuakiOkamoto(NTT, Japan). Many people helped to make ISC 2008 successful. We would like to thank all thosewhocontributedtothetechnicalprogramandtoorganizingtheconference.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 524 pp. Englisch. Artikel-Nr. 9783540858843
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols. Artikel-Nr. 9783540858843
Anzahl: 1 verfügbar