logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings

Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings (Paperback, 1997)

Josef Pieprzyk (엮은이)
Springer Verlag
102,960원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
84,420원 -18% 0원
4,230원
80,190원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings
eBook 미리보기

책 정보

· 제목 : Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings (Paperback, 1997) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783540632320
· 쪽수 : 343쪽
· 출판일 : 1997-06-25

목차

Trusted third parties for secure electronic commerce - Are they needed.- Prospectives for modelling trust in information security.- Analysis and implementation of a formal authorization policy design approach.- An approach to dynamic domain and type enforcement.- Purpose-oriented access control model in object-based systems.- User Access Domain Management System-ADAMS.- Revocation of unread e-mail in an untrusted network.- Security issues in asynchronous transfer mode.- A method to implement a denial of service protection base.- ProtectOS: Operating system and hardware support for small objects.- Practical memory checkers for stacks, queues and deques.- Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields.- A new hash function based on block cipher.- New lower bounds on nonlinearity and a class of highly nonlinear functions.- On the security of self-synchronous ciphers.- Inefficiency of variant characteristics for substitution-permutation networks with position permutations.- Secret sharing with reusable polynomials.- A message authentication code based on latin squares.- Characterization of (k, n) multi-receiver authentication.- Cryptanalysis of adaptive arithmetic coding encryption schemes.- Fast correlation attacks and multiple linear approximations.- Verifiable escrowed signature.- Democratic key escrow scheme.- Design and analyses of two basic protocols for use in TTP-based Key escrow.- Protection of data and delegated keys in digital distribution.- New micropayment schemes based on Pay Words.- On key agreement and conference key agreement.- Identity-based and self-certified key-exchange protocols.- Enabling technology for the trading of MPEG-encoded Video.- Image distribution method with embedded identifier scheme for copyright protection.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책