logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J

Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J (Hardcover, 2005)

(Ifip Tc11 20th International Information Security Conference?)

Tc11 International Information Security (지은이)
  |  
Springer-Verlag New York Inc
2005-05-19
  |  
284,860원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 233,580원 -18% 0원 11,680원 221,900원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J

책 정보

· 제목 : Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J (Hardcover, 2005) (Ifip Tc11 20th International Information Security Conference?)
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9780387256580
· 쪽수 : 612쪽

목차

Regular Papers.- Accountable Anonymous E-Mail.- Protecting Consumer Data in Composite Web Services.- A Decision Matrix Approach.- Assignment of Security Clearances in an Organization.- Tool Supported Management of Information Security Culture.- ERPSEC - A Reference Framework to Enhance Security in ERP Systems.- A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.- A Secure Quantum Communication Protocol Using Insecure Public Channels.- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.- Design and Implementation of TPM SUP320.- Mathematical Models of IP Traceback Methods and Their Verification.- Transferable E-Cash Revisit.- A License Transfer System for Supporting Content Portability in Digital Rights Management.- Secure Human Communications Based on Biometrics Signals.- Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.- An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN.- The Pairing Problem with User Interaction.- Network Smart Card.- Protection Against Spam Using Pre-Challenges.- Automatically Hardening Web Applications Using Precise Tainting.- Traffic Redirection Attack Protection System (TRAPS).- Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks.- Design, Implementation, and Evaluation of Fritrace.- Design and Implementation of a High-Performance Network Intrusion Prevention System.- STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis.- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection.- Designated-Verifier Proxy Signature Schemes.- Tripartite Concurrent Signatures.- Signcryption in Hierarchical Identity Based Cryptosystem.- Protecting Group Dynamic Information in Large Scale Multicast Groups.- Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks.- Ensuring Media Integrity on Third-Party Infrastructures.- A New Fragile Mesh Watermarking Algorithm for Authentication.- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.- Workshop Papers.- Overcoming Channel Bandwidth Constraints in Secure SIM Applications.- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.- On-the-Fly Formal Testing of a Smart Card Applet.- A Computationally Feasible SPA Attack on AES VIA Optimized Search.- The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations.- Streamto: Streaming Content Using a Tamper-Resistant Token.

저자소개

Tc11 International Information Security (지은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책