Produktart
Zustand
Einband
Weitere Eigenschaften
Gratisversand
Land des Verkäufers
Verkäuferbewertung
Verlag: Prentice Hall Computer, 2002
ISBN 10: 0130092207ISBN 13: 9780130092205
Anbieter: unifachbuch e.K., Köln, NRW, Deutschland
Buch
Taschenbuch. Zustand: Gebraucht. Unbenutzte Restauflage Unbenutzt. Schnelle Lieferung, Kartonverpackung. Abzugsfähige Rechnung. Bei Mehrfachbestellung werden die Versandkosten anteilig erstattet. 352 pp. Englisch.
Verlag: Springer Berlin Heidelberg 2010-07-15, Berlin, 2010
ISBN 10: 3642145965ISBN 13: 9783642145964
Anbieter: Blackwell's, London, Vereinigtes Königreich
Buch
paperback. Zustand: New. Language: ENG.
Verlag: Springer Berlin Heidelberg, 2009
ISBN 10: 3642005861ISBN 13: 9783642005862
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrus t 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.
Verlag: Springer International Publishing, 2018
ISBN 10: 3319991353ISBN 13: 9783319991351
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
Verlag: Springer Berlin Heidelberg, 2008
ISBN 10: 3540791035ISBN 13: 9783540791034
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The4thInformationSecurityPracticeandExperienceConference(ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, Australia, during April 21 23, 2008. The previous three conferences were held in Singapore in 2005, Hangzhou, China in 2006 and Hong Kong, China in 2007. As with the previous three conference proceedings, the proceedings of ISPEC 2008 were published in the LNCS series by Springer. Theconferencereceived95submissions,outofwhichtheProgramCommittee selected 29 papers for presentation at the conference. These papers are included in the proceedings. The accepted papers cover a range of topics in mathem- ics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve-basedsecuritypractice,securitycomputationandso forth.The conference proceedings contain revised versions of the selected papers. Since some of them were not checked again for correctness before publication, the authors (and not the ProgramCommittee)bear full responsibilityfor the contentsoftheir papers. In addition to the contributed papers, the program comprised two invited talks.TheinvitedspeakerswereVijayVaradharajan(MacquarieUniversity,A- tralia) and Robert Huijie Deng (Singapore Management University, Singapore). Special thanks are due to these speakers. Wewouldliketothankallthepeoplewhohelpedwiththeconferenceprogram and organization. First, we thank the Steering Committee for their guidance on the general format of the conference. We also heartily thank the Program Committee and the sub-reviewers listed on the following pages for their hard e orts and time contributed to the review process, which took seven weeks. Each paper was carefully evaluated by at least two or three people. There was signi cant online discussion about a large number of papers.
Verlag: Springer Berlin Heidelberg, 2008
ISBN 10: 3540886249ISBN 13: 9783540886242
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.
Verlag: Springer International Publishing, 2020
ISBN 10: 3030589501ISBN 13: 9783030589509
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
Verlag: Springer International Publishing, 2020
ISBN 10: 3030590127ISBN 13: 9783030590123
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
Verlag: Springer Berlin Heidelberg, 2012
ISBN 10: 3642322972ISBN 13: 9783642322976
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.
Verlag: Springer Berlin Heidelberg, 2011
ISBN 10: 3642252826ISBN 13: 9783642252822
Anbieter: moluna, Greven, Deutschland
Buch
Zustand: New.