logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20

Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20 (Hardcover, 2009)

Dimitris Gritzalis, Javier Lopez (엮은이)
  |  
Springer-Verlag New York Inc
2009-05-14
  |  
184,980원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 151,680원 -18% 0원 7,590원 144,090원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20

책 정보

· 제목 : Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20 (Hardcover, 2009) 
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 보안
· ISBN : 9783642012433
· 쪽수 : 444쪽

목차

Identification and Authentication I.- Flexible and Transparent User Authentication for Mobile Devices.- Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.- Audio CAPTCHA for SIP-Based VoIP.- Threats and Attacks.- Roving Bugnet: Distributed Surveillance Threat and Mitigation.- On Robust Covert Channels Inside DNS.- Discovering Application-Level Insider Attacks Using Symbolic Execution.- Identification and Authentication II.- Custom JPEG Quantization for Improved Iris Recognition Accuracy.- On the IPP Properties of Reed-Solomon Codes.- A Generic Authentication LoA Derivation Model.- Applications of Cryptography and Information Hiding.- Media-Break Resistant eSignatures in eGovernment: An Austrian Experience.- How to Bootstrap Security for Ad-Hoc Network: Revisited.- Steganalysis of Hydan.- Trusted Computing.- On the Impossibility of Detecting Virtual Machine Monitors.- Implementation of a Trusted Ticket System.- Security Policies.- A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor.- A Policy Language for Modelling Recommendations.- Validation, Verification, Evaluation.- On the Security Validation of Integrated Security Solutions.- Verification of Security Policy Enforcement in Enterprise Systems.- Optimization of the Controlled Evaluation of Closed Relational Queries.- Privacy Protection - Security Assessment.- Collaborative Privacy - A Community-Based Privacy Infrastructure.- Security and Privacy Improvements for the Belgian eID Technology.- A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components.- Role Mining and Content Protection.- Mining Stable Roles in RBAC.- Privacy-Preserving Content-Based Publish/Subscribe Networks.- Broadcast Encryption for Differently Privileged.- Ontology-Based Secure XML Content Distribution.- Security Protocols.- NGBPA Next Generation BotNet Protocol Analysis.- Non-repudiation Analysis with LySa.- A Provably Secure Secret Handshake with Dynamic Controlled Matching.- Towards a Theory of White-Box Security.- Access Control.- On a Taxonomy of Delegation.- Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.- A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.- Automating Access Control Logics in Simple Type Theory with LEO-II.- Internet and Web Applications Security.- In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security.- Persona: Network Layer Anonymity and Accountability for Next Generation Internet.- Jason: A Scalable Reputation System for the Semantic Web.- Which Web Browsers Process SSL Certificates in a Standardized Way?.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책