Cryptology and Network Security -
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre71,50 €
Produit Neuf
Ou 17,88 € /mois
- Livraison à 0,01 €
- Livré entre le 4 et le 11 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9783540494621_dbm
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Cryptology And Network Security Format Broché - Livre Encyclopédies, Dictionnaires
0 avis sur Cryptology And Network Security Format Broché - Livre Encyclopédies, Dictionnaires
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Art Of Modern Rock
2 avis
Occasion dès 50,00 €
-
Diego Rivera. The Complete Murals
Neuf dès 97,04 €
Occasion dès 65,00 €
-
Mobilier Art Deco
Occasion dès 40,00 €
-
Francois Catroux
Occasion dès 71,38 €
-
Arda Reconstructed
Neuf dès 67,42 €
-
Hollywood Jewels: Movies, Jewelry, Stars
Occasion dès 106,99 €
-
Martin Chambi: 1920-1950 (Spanish Edition)
Occasion dès 87,72 €
-
Le Medecin Des Pauvres: 2000 Remèdes Et Savoirs De La Médecine Populaire (Édition Illustrée)
Occasion dès 65,89 €
-
Bernard Frize: Longues Lignes (Souvent Fermees)
Occasion dès 63,99 €
-
Bmw R1200 Twins (04 - 09) Haynes Repair Manual
Neuf dès 45,11 €
Occasion dès 80,99 €
-
Fleet Tactics And Naval Operations, Third Edition
Neuf dès 39,33 €
-
Lewis Carroll's Photography And Modern Childhood
Neuf dès 83,15 €
-
Shakespeare Comes To Broadmoor
Neuf dès 40,41 €
-
Complete Ielts Bands 6.5-7.5 Workbook Without Answers With Audio Cd
Neuf dès 38,71 €
-
Phenomenology Of Spirit
Neuf dès 48,69 €
Occasion dès 37,32 €
-
Pomellato
Occasion dès 80,00 €
-
La Sante Interdite
Occasion dès 71,00 €
-
Warehouse Management
Neuf dès 66,26 €
-
Storm Chasing Handbook, 2nd. Ed.
Neuf dès 64,46 €
-
Dosso Dossi: Court Painter In Renaissance Ferrara
Occasion dès 55,00 €
Produits similaires
Présentation Cryptology And Network Security Format Broché
- Livre Encyclopédies, Dictionnaires
Résumé :
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.
Sommaire:
Encryption.- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.- Efficient Identity-Based Encryption with Tight Security Reduction.- Key Exchange.- A Diffie-Hellman Key Exchange Protocol Without Random Oracles.- Authenticated Group Key Agreement for Multicast.- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.- Authentication and Signatures.- Efficient Mutual Data Authentication Using Manually Authenticated Strings.- Achieving Multicast Stream Authentication Using MDS Codes.- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps.- Proxy Signatures.- Security Model of Proxy-Multi Signature Schemes.- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.- Cryptanalysis.- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.- Improved Collision Attack on Reduced Round Camellia.- Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.- Implementation.- Bitslice Implementation of AES.- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3).- Steganalysis and Watermarking.- Steganalysis Based on Differential Statistics.- Watermarking Essential Data Structures for Copyright Protection.- Boolean Functions and Stream Ciphers.- A Note of Perfect Nonlinear Functions.- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing.- Intrusion Detection.- Cooperative Intrusion Detection for Web Applications.- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems.- A Multi-agent Cooperative Model and System for Integrated Security Monitoring.- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network.- An Immune-Based Model for Service Survivability.- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks....
Détails de conformité du produit
Personne responsable dans l'UE