logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L

Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L (Paperback, 2005)

David Chadwick, Bart Preneel (엮은이)
  |  
Springer-Verlag New York Inc
2014-12-01
  |  
186,230원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 152,700원 -18% 0원 7,640원 145,060원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L

책 정보

· 제목 : Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L (Paperback, 2005) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9781461498933
· 쪽수 : 290쪽

목차

Privacy/Anonymity.- Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols.- Personal Attributes and Privacy.- Mobile Security 1.- Local Management of Credits and Debits in Mobile Ad Hoc Networks.- How Secure are Current Mobile Operating Systems?.- An Overview of Security Issues and Techniques in Mobile Agents.- Mobile Security 2.- A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.- Mobile Trust Negotiation.- Weak Context Establishment Procedure for Mobility and Multi-Homing Management.- Security in Microsoft .Net.- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.- Threat Modelling for Web Services Based Web Applications.- Threat Modelling for ASP.NET.- Threat Modelling for SQL Servers.- Threat Modelling for Active Directory.- Threat Modelling for Security Tokens in Web Applications.- Cryptography.- Analysis of the DVB Common Scrambling Algorithm.- An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.- Multimedia Security.- Robust Visual Hashing Using JPEG 2000.- A System for End-to-End Authentication of Adaptive Multimedia Content.- Application Level Security.- Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.- Secure Role Based Messaging.- Five Non-Technical Pillars of Network Information Security Management.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책