logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings (Paperback, 2013)

Kazuo Sakiyama, Masayuki Terada (엮은이)
  |  
Springer
2013-10-09
  |  
93,100원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 76,340원 -18% 0원 3,820원 72,520원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

책 정보

· 제목 : Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings (Paperback, 2013) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783642413827
· 쪽수 : 319쪽

목차

Software and System Security.- Secure Log Transfer by Replacing a Library in a Virtual Machine.- Static Integer Overflow Vulnerability Detection in Windows Binary.- Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition.- Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.- Cryptanalysis.- Differential Power Analysis of MAC-Keccak at Any Key-Length.- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.- New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.- Improvement of Faug`ere et al.'s Method to Solve ECDLP.- Privacy and Cloud Computing.- Statistics on Encrypted Cloud Data.- Toward Practical Searchable Symmetric Encryption.- Unconditionally Secure Oblivious Transfer from Real Network Behavior.- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.- Public Key Cryptosystems.- Efficient Algorithm for Tate Pairing of Composite Order.- How to Factor N1 and N2 When p1 = p2 mod 2t.- Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption.- Cryptanalysis of the Quaternion Rainbow.- Security Protocols.- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.- One-Round Authenticated Key Exchange without Implementation Trick.- Attacks to the Proxy Re-Encryption Schemes from IWSEC2011.- Game-Theoretic Security for Bit Commitment.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책