Muutke küpsiste eelistusi

E-raamat: Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 4856
  • Ilmumisaeg: 15-Nov-2007
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540769699
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 4856
  • Ilmumisaeg: 15-Nov-2007
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540769699
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Signatures.- Mutative Identity-Based Signatures or Dynamic Credentials
Without Random Oracles.- A Generic Construction for Universally-Convertible
Undeniable Signatures.- Fast Digital Signature Algorithm Based on Subgraph
Isomorphism.- Efficient ID-Based Digital Signatures with Message Recovery.-
Network Security.- Achieving Mobility and Anonymity in IP-Based Networks.-
Perfectly Secure Message Transmission in Directed Networks Tolerating
Threshold and Non Threshold Adversary.- Forward-Secure Key Evolution in
Wireless Sensor Networks.- A Secure Location Service for Ad Hoc
Position-Based Routing Using Self-signed Locations.- An Intelligent
Network-Warning Model with Strong Survivability.- Running on Karma P2P
Reputation and Currency Systems.- Secure Keyword Search and Private
Information Retrieval.- Generic Combination of Public Key Encryption with
Keyword Search and Public Key Encryption.- Extended Private Information
Retrieval and Its Application in Biometrics Authentications.- Public Key
Encryption.- Strongly Secure Certificateless Public Key Encryption Without
Pairing.- Intrusion Detection.- Modeling Protocol Based Packet Header Anomaly
Detector for Network and Host Intrusion Detection Systems.- Email Security.-
How to Secure Your Email Address Book and Beyond.- Denial of Service
Attacks.- Toward Non-parallelizable Client Puzzles.- Authentication.-
Anonymity 2.0 X.509 Extensions Supporting Privacy-Friendly Authentication.