|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Informations- und Kommunikationssicherheit: 14. Internationale Konferenz, ICICS 20

Artikelzustand:
Neu
7 verfügbar
Preis:
US $66,66
Ca.CHF 60,32
Versand:
Kostenlos Economy Shipping. Weitere Detailsfür Versand
Standort: Fairfield, Ohio, USA
Lieferung:
Lieferung zwischen Sa, 1. Jun und Mi, 12. Jun nach 43230 bei heutigem Zahlungseingang
Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahmen:
30 Tage Rückgabe. Käufer zahlt Rückversand. Weitere Details- Informationen zu Rückgaben
Zahlungen:
     

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. 

Angaben zum Verkäufer

Angemeldet als gewerblicher Verkäufer
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:395142256755
Zuletzt aktualisiert am 01. Apr. 2024 08:08:48 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neu: Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte ...
ISBN-13
9783642341281
Book Title
Information and Communications Security
ISBN
9783642341281
Series
Lecture Notes in Computer Science Ser.
Publication Year
2012
Type
Textbook
Format
Trade Paperback
Language
English
Publication Name
Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings
Author
Tsz Hon Yuen
Item Length
9.3in
Publisher
Springer Berlin / Heidelberg
Item Width
6.1in
Item Weight
28 Oz
Number of Pages
Xvi, 506 Pages

Über dieses Produkt

Product Information

Audio Steganalysis Based on Lossless Data-Compression Techniques.- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.- Impact of the Revocation Service in PKI Prices.- Cryptanalysis of Multi-Prime RSA with Small Prime Difference.- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.- Improved Related-Key Differential Attacks on Reduced-Round LBlock.- Countermeasures on Application Level Low-Rate Denial-of-Service Attack.- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.- Group Behavior Metrics for P2P Botnet Detection.- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.- Perfect Ambiguous Optimistic Fair Exchange.- Privacy-Preserving Noisy Keyword Search in Cloud Computing.- Forward Secure Attribute-Based Signatures.- On Constant-Round Precise Zero-Knowledge.- Outsourcing Encryption of Attribute-Based Encryption with MapReduce.- Security Enhancement of Identity-Based Identification with Reversibility.- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.- Permission-Based Abnormal Application Detection for Android.- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine.- A Generic Approach for Providing Revocation Support in Secret Handshake.- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.- Exploring Mobile Proxies for Better Password Authentication.- On Security of Universal Hash Function Based Multiple Authentication.- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.- Comparison between Side-Channel Analysis Distinguishers.- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition.- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer.- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance.- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography.- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.- Location Privacy Policy Management System.- Privacy Protection in Social Networks Using l -Diversity.- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.- A Key Sharing Fuzzy Vault Scheme.- A New Version of McEliece PKC Based on Convolutional Codes.- Flexible Attribute-Based Encryption.- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.- A Comparative Study of Malware Family Classification.- A Fine-Grained Classification Approach for the Packed Malicious Code.

Product Identifiers

Publisher
Springer Berlin / Heidelberg
ISBN-10
3642341284
ISBN-13
9783642341281
eBay Product ID (ePID)
144097366

Product Key Features

Author
Tsz Hon Yuen
Publication Name
Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings
Format
Trade Paperback
Language
English
Series
Lecture Notes in Computer Science Ser.
Publication Year
2012
Type
Textbook
Number of Pages
Xvi, 506 Pages

Dimensions

Item Length
9.3in
Item Width
6.1in
Item Weight
28 Oz

Additional Product Features

Series Volume Number
7618
Number of Volumes
1 Vol.
Lc Classification Number
Qa268
Table of Content
Audio Steganalysis Based on Lossless Data-Compression Techniques.- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.- Impact of the Revocation Service in PKI Prices.- Cryptanalysis of Multi-Prime RSA with Small Prime Difference.- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.- Improved Related-Key Differential Attacks on Reduced-Round LBlock.- Countermeasures on Application Level Low-Rate Denial-of-Service Attack.- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.- Group Behavior Metrics for P2P Botnet Detection.- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.- Perfect Ambiguous Optimistic Fair Exchange.- Privacy-Preserving Noisy Keyword Search in Cloud Computing.- Forward Secure Attribute-Based Signatures.- On Constant-Round Precise Zero-Knowledge.- Outsourcing Encryption of Attribute-Based Encryption with MapReduce.- Security Enhancement of Identity-Based Identification with Reversibility.- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.- Permission-Based Abnormal Application Detection for Android.- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine.- A Generic Approach for Providing Revocation Support in Secret Handshake.- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.- Exploring Mobile Proxies for Better Password Authentication.- On Security of Universal Hash Function Based Multiple Authentication.- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.- Comparison between Side-Channel Analysis Distinguishers.- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme.- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition.- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer.- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding.- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance.- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography.- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances.- Location Privacy Policy Management System.-Privacy Protection in Social Networks Using l -Diversity.- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.- A Key Sharing Fuzzy Vault Scheme.- A New Version of McEliece PKC Based on Convolutional Codes.- Flexible Attribute-Based Encryption.- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.- A Comparative Study of Malware Family Classification.- A Fine-Grained Classification Approach for the Packed Malicious Code.
Copyright Date
2012
Topic
Information Theory, Security / Cryptography, Security / General, Telecommunications, Databases / General
Lccn
2012-948707
Dewey Decimal
005.8
Intended Audience
Scholarly & Professional
Dewey Edition
23
Illustrated
Yes
Genre
Computers, Technology & Engineering

Artikelbeschreibung des Verkäufers

grandeagleretail

grandeagleretail

98,2% positive Bewertungen
2.7 Mio. Artikel verkauft
Shop besuchenKontakt
Antwortet meist innerhalb 24 Stunden

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten

Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
4.9
Kommunikation
4.9
Angemeldet als gewerblicher Verkäufer

Verkäuferbewertungen (1'022'983)

n***3 (1730)- Bewertung vom Käufer.
Letzter Monat
Bestätigter Kauf
GREAT PRODUCT
6***0 (407)- Bewertung vom Käufer.
Letzter Monat
Bestätigter Kauf
A+++++
u***s (1996)- Bewertung vom Käufer.
Letzter Monat
Bestätigter Kauf
A+++++