Muutke küpsiste eelistusi

E-raamat: Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 7011
  • Ilmumisaeg: 14-Oct-2011
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642245862
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 7011
  • Ilmumisaeg: 14-Oct-2011
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642245862

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.
Invited Talks
Engineering Trustworthy Systems
1(1)
Sanjay Burman
Secure Implementations for the Internet of Things
2(1)
Jorn-Marc Schmidt
Embedded Security
Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP
3(13)
Kunal Sadalkar
Radhesh Mohandas
Alwyn R. Pais
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack
16(14)
Santosh Ghosh
Dipanwita Roychowdhury
Embedded Software Security through Key-Based Control Flow Obfuscation
30(15)
Rajat Subhra Chakraborty
Seetharam Narasimhan
Swarup Bhunia
Digital Rights Management
Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform
45(12)
Sambaran Bandyopadhyay
Ruchira Naskar
Rajat Subhra Chakraborty
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture
57(15)
Ratna Dutta
Dheerendra Mishra
Sourav Mukhopadhyay
Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance
72(11)
Ratna Dutta
Cryptographic Protocols
An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
83(10)
Namita Tiwari
Sahadeo Padhye
Distributed Signeryption Schemes with Formal Proof of Security
93(18)
Indivar Gupta
P.K. Saxena
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
111(17)
S. Sharmila Deva Selvi
S. Sree Vivek
C. Pandu Rangan
Cryptanalysis/Side Channel Attacks
"Rank Correction": A New Side-Channel Approach for Secret Key Recovery
128(16)
Maxime Nassar
Youssef Souissi
Sylvain Guilley
Jean-Luc Danger
A Cache Trace Attack on CAMELLIA
144(13)
Rishabh Poddar
Amit Datta
Chester Rebeiro
An Improvement of Linearization-Based Algebraic Attacks
157(11)
Satrajit Ghosh
Abhijit Das
Cipher Primitives
Generalized Avalanche Test for Stream Cipher Analysis
168(13)
P.R. Mishra
Indivar Gupta
N.R. Pillai
On Applications of Singular Matrices over Finite Fields in Cryptography
181(6)
Dhirendra Singh Yadav
Rajendra K. Sharma
Wagish Shukla
Author Index 187