logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Information Security and Privacy: 7th Australian Conference, Acisp 2002 Melbourne, Australia, July 3-5, 2002 Proceedings

Information Security and Privacy: 7th Australian Conference, Acisp 2002 Melbourne, Australia, July 3-5, 2002 Proceedings (Paperback, 2002)

Jennifer Seberry (엮은이)
Springer Verlag
197,480원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
161,930원 -18% 0원
8,100원
153,830원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Information Security and Privacy: 7th Australian Conference, Acisp 2002 Melbourne, Australia, July 3-5, 2002 Proceedings
eBook 미리보기

책 정보

· 제목 : Information Security and Privacy: 7th Australian Conference, Acisp 2002 Melbourne, Australia, July 3-5, 2002 Proceedings (Paperback, 2002) 
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9783540438618
· 쪽수 : 516쪽
· 출판일 : 2002-06-19

목차

Key Handling.- A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.- Security Analysis and Improvement of the Global Key Recovery System.- The LILI-II Keystream Generator.- A Secure Re-keying Scheme with Key Recovery Property.- Trust and Secret Sharing.- Modelling Trust Structures for Public Key Infrastructures.- Size of Broadcast in Threshold Schemes with Disenrollment.- Requirements for Group Independent Linear Threshold Secret Sharing Schemes.- Efficient Sharing of Encrypted Data.- Cheating Prevention in Linear Secret Sharing.- Fast Computation.- Note on Fast Computation of Secret RSA Exponents.- Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying.- Cryptanalysis I.- Cryptanalysis of Stream Cipher COS (2, 128) Mode I.- The Analysis of Zheng-Seberry Scheme.- Cryptanalysis of Stream Cipher Alpha1.- A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem.- Elliptic Curves.- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over .- Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.- A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.- AES.- Strengthening the Key Schedule of the AES.- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.- Security Management.- Security Management: An Information Systems Setting.- Resolving Conflicts in Authorization Delegations.- Policy Administration Domains.- Authentication.- Maintaining the Validity of Digital Signatures in B2B Applications.- Short 3-Secure Fingerprinting Codes for Copyright Protection.- An Order-Specified Multisignature Scheme Secure against Active Insider Attacks.- Authenticated Operation of Open Computing Devices.- A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem.- Invited Talk.- A Brief Outline of Research on Correlation Immune Functions.- Oblivious Transfer.- m out of n Oblivious Transfer.- Cryptanalysis II.- On the Security of Reduced Versions of 3-Pass HAVAL.- On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.- On the Security of a Modified Paillier Public-Key Primitive.- Dealing with Adversaries.- How to Play Sherlock Holmes in the World of Mobile Agents.- A Practical Approach Defeating Blackmailing.- Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing.- Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책