logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Information Security Practice and Experience: Second International Conference, Ispec 2006, Hangzhou, China, April 11-14, 2006, Proceedings

Information Security Practice and Experience: Second International Conference, Ispec 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006)

Kefei Chen, Robert H. Deng, Xuejia Lai (엮은이)
Springer-Verlag New York Inc
100,290원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
82,230원 -18% 0원
4,120원
78,110원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Information Security Practice and Experience: Second International Conference, Ispec 2006, Hangzhou, China, April 11-14, 2006, Proceedings
eBook 미리보기

책 정보

· 제목 : Information Security Practice and Experience: Second International Conference, Ispec 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006) 
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9783540330523
· 쪽수 : 392쪽
· 출판일 : 2006-03-24

목차

Cryptoanalysis.- DPA-Resistant Finite Field Multipliers and Secure AES Design.- Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.- Diophantine Approximation Attack on a Fast Public Key Cryptosystem.- Further Security Analysis of XTR.- Network Security I.- A Counting-Based Method for Massive Spam Mail Classification.- Model and Estimation of Worm Propagation Under Network Partition.- Tackling Worm Detection Speed and False Alarm in Virus Throttling.- Network Security II.- Using Data Field to Analyze Network Intrusions.- Adversarial Organization Modeling for Network Attack/Defense.- A Novel Dynamic Immunization Strategy for Computer Network Epidemics.- Preventing Web-Spoofing with Automatic Detecting Security Indicator.- Security Protocol.- Security Protocol Analysis with Improved Authentication Tests.- A Protocol of Member-Join in a Secret Sharing Scheme.- More on Shared-Scalar-Product Protocols.- Communication Security.- Efficient Public Key Broadcast Encryption Using Identifier of Receivers.- A Practical Clumped-Tree Multicast Encryption Scheme.- Trojan Horse Attack Strategy on Quantum Private Communication.- Signature and Key Agreement.- Linkable Democratic Group Signatures.- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.- Short (Identity-Based) Strong Designated Verifier Signature Schemes.- Identity Based Key Insulated Signature.- Application I.- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.- A Design and Implementation of Profile Based Web Application Securing Proxy.- An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.- Application II.- Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments.- Using ?-Calculus to Formalize Domain Administration of RBAC.- An Efficient Way to Build Secure Disk.- Practical Forensic Analysis in Advanced Access Content System.- Cryptographic Techniques.- Security Analysis of a Server-Aided RSA Key Generation Protocol.- Integrating Grid with Cryptographic Computing.- Three-Round Secret Handshakes Based on ElGamal and DSA.- System Security.- Securing C Programs by Dynamic Type Checking.- A Chaos-Based Robust Software Watermarking.- Privately Retrieve Data from Large Databases.- An Empirical Study of Quality and Cost Based Security Engineering.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책