logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings

Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Paperback)

Hiroshi Yoshiura, Kouichi Sakurai (엮은이)
Springer-Verlag New York Inc
94,350원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
77,360원 -18% 0원
3,870원
73,490원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings
eBook 미리보기

책 정보

· 제목 : Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 운영체제(OS) > 일반
· ISBN : 9783540476993
· 쪽수 : 438쪽
· 출판일 : 2006-10-11

목차

Signatures (1).- ID-Based Ring Signature Scheme Secure in the Standard Model.- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.- Sound Computational Interpretation of Symbolic Hashes in the Standard Model.- Security Evaluation.- A Requirement Centric Framework for Information Security Evaluation.- A Model-Based Method for Security Configuration Verification.- Personal Computer Privacy: Analysis for Korean PC Users.- Signatures (2).- Short Traceable Signatures Based on Bilinear Pairings.- Ring Signature with Designated Linkability.- Ad Hoc Group Signatures.- Rateless Codes for the Multicast Stream Authentication Problem.- Authentication.- Crossing Borders: Security and Privacy Issues of the European e-Passport.- A New Approach to Hide Policy for Automated Trust Negotiation.- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.- Security for Multimedia.- A Study of Detection Method of Printed Image Alteration Using Digital Watermark.- Real-Time Watermark Embedding for High Resolution Video Watermarking.- Inhibiting Card Sharing Attacks.- Network Security.- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction.- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.- Modeling of Network Intrusions Based on the Multiple Transition Probability.- Encryption and Key Exchange.- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition.- Ciphertext-Auditable Public Key Encryption.- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model.- Cryptanalysis and Implementation.- On the Effectiveness of TMTO and Exhaustive Search Attacks.- Low Power AES Hardware Architecture for Radio Frequency Identification.- The High-Speed Packet Cipher System Suitable for Small Sized Data.- Access Control.- A Tool for Managing Security Policies in Organisations.- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.- The Complexity of Discretionary Access Control.- Traceroute Based IP Channel for Sending Hidden Short Messages.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책