logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceed

Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceed (Paperback)

Herbert Leitold, Evangelos Markatos (엮은이)
  |  
Springer-Verlag New York Inc
2006-10-11
  |  
93,100원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 76,340원 -18% 0원 3,820원 72,520원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceed

책 정보

· 제목 : Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceed (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 하드웨어 > 네트워크 하드웨어
· ISBN : 9783540478201
· 쪽수 : 260쪽

목차

Computing of Trust in Ad-Hoc Networks.- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.- On the Privacy Risks of Publishing Anonymized IP Network Traces.- Secure Mobile Notifications of Civilians in Case of a Disaster.- A Fair Anonymous Submission and Review System.- Attribute Delegation Based on Ontologies and Context Information.- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.- Perturbing and Protecting a Traceable Block Cipher.- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.- Timed Release Cryptography from Bilinear Pairings Using Hash Chains.- Compression of Encrypted Visual Data.- Selective Encryption for Hierarchical MPEG.- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.- A Flexible and Open DRM Framework.- PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.- A Privacy Agent in Context-Aware Ubiquitous Computing Environments.- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.- Attack Graph Based Evaluation of Network Security.- Information Modeling for Automated Risk Analysis.- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책