logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cryptology and Network Security: 5th International Conference, Cans 2006, Suzhou, China, December 8-10, 2006, Proceedings

Cryptology and Network Security: 5th International Conference, Cans 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback)

Yi Mu, David Pointcheval, Kefei Chen (엮은이)
Springer-Verlag New York Inc
98,100원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
80,440원 -18% 0원
4,030원
76,410원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Cryptology and Network Security: 5th International Conference, Cans 2006, Suzhou, China, December 8-10, 2006, Proceedings
eBook 미리보기

책 정보

· 제목 : Cryptology and Network Security: 5th International Conference, Cans 2006, Suzhou, China, December 8-10, 2006, Proceedings (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9783540494621
· 쪽수 : 384쪽
· 출판일 : 2006-11-27

목차

Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Efficient Identity-Based Encryption with Tight Security Reduction.- Key Exchange.- A Diffie-Hellman Key Exchange Protocol Without Random Oracles.- Authenticated Group Key Agreement for Multicast.- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.- Authentication and Signatures.- Efficient Mutual Data Authentication Using Manually Authenticated Strings.- Achieving Multicast Stream Authentication Using MDS Codes.- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.- Proxy Signatures.- Security Model of Proxy-Multi Signature Schemes.- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.- Cryptanalysis.- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.- Improved Collision Attack on Reduced Round Camellia.- Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.- Implementation.- Bitslice Implementation of AES.- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).- Steganalysis and Watermarking.- Steganalysis Based on Differential Statistics.- Watermarking Essential Data Structures for Copyright Protection.- Boolean Functions and Stream Ciphers.- A Note of Perfect Nonlinear Functions.- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.- Intrusion Detection.- Cooperative Intrusion Detection for Web Applications.- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.- A Multi-agent Cooperative Model and System for Integrated Security Monitoring.- Disponibility and Reliability.- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.- An Immune-Based Model for Service Survivability.- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책