Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings - Pasta blanda
2010, ISBN: 3642154964
[EAN: 9783642154966], Gebraucht, guter Zustand, [SC: 48.53], [PU: Springer Berlin], AUTHORIZATION,SECURITY,ALGORITHM ANALYSIS AND PROBLEM COMPLEXITY,PRIVACY,E-VOTING,ACCESS CONTROL,TRUST,… Más…
ZVAB.com Buchpark, Trebbin, Germany [83435977] [Rating: 5 (von 5)] NOT NEW BOOK. Gastos de envío: EUR 48.53 Details... |
Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings - Pasta blanda
2010, ISBN: 3642154964
[EAN: 9783642154966], Gebraucht, guter Zustand, [PU: Springer Berlin], AUTHORIZATION,SECURITY,ALGORITHM ANALYSIS AND PROBLEM COMPLEXITY,PRIVACY,E-VOTING,ACCESS CONTROL,TRUST,ANONYMITY,INT… Más…
AbeBooks.de Buchpark, Trebbin, Germany [83435977] [Rating: 5 (von 5)] NOT NEW BOOK. Gastos de envío: EUR 48.53 Details... |
Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings - libro usado
2010, ISBN: 9783642154966
[PU: Springer Berlin], Neubindung, Buchrücken leicht eingerissen 8638755/12, DE, [SC: 3.00], gebraucht; sehr gut, gewerbliches Angebot, 2010, Banküberweisung, Kreditkarte, PayPal, Interna… Más…
booklooker.de |
2010, ISBN: 9783642154966
It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 wa… Más…
ebay.at grandeagleretail 98.2, Priority Listing. Gastos de envío:Versand zum Fixpreis, 450** Fairfield. (EUR 21.75) Details... |
Computer Security Esorics 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 2022, 2010 Proceedings 6345 Lecture Notes in Computer Science - Pasta blanda
2008, ISBN: 9783642154966
Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… Más…
alibris.co.uk |
Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings - Pasta blanda
2010, ISBN: 3642154964
[EAN: 9783642154966], Gebraucht, guter Zustand, [SC: 48.53], [PU: Springer Berlin], AUTHORIZATION,SECURITY,ALGORITHM ANALYSIS AND PROBLEM COMPLEXITY,PRIVACY,E-VOTING,ACCESS CONTROL,TRUST,… Más…
Gritzalis, Dimitris, Bart Preneel und Marianthi Theoharidou:
Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings - Pasta blanda2010, ISBN: 3642154964
[EAN: 9783642154966], Gebraucht, guter Zustand, [PU: Springer Berlin], AUTHORIZATION,SECURITY,ALGORITHM ANALYSIS AND PROBLEM COMPLEXITY,PRIVACY,E-VOTING,ACCESS CONTROL,TRUST,ANONYMITY,INT… Más…
Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings - libro usado
2010
ISBN: 9783642154966
[PU: Springer Berlin], Neubindung, Buchrücken leicht eingerissen 8638755/12, DE, [SC: 3.00], gebraucht; sehr gut, gewerbliches Angebot, 2010, Banküberweisung, Kreditkarte, PayPal, Interna… Más…
2010, ISBN: 9783642154966
It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 wa… Más…
Computer Security Esorics 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 2022, 2010 Proceedings 6345 Lecture Notes in Computer Science - Pasta blanda
2008, ISBN: 9783642154966
Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… Más…
Datos bibliográficos del mejor libro coincidente
Autor: | |
Título: | |
ISBN: |
Detalles del libro - Computer Security - ESORICS 2010
EAN (ISBN-13): 9783642154966
ISBN (ISBN-10): 3642154964
Tapa dura
Tapa blanda
Año de publicación: 2010
Editorial: Springer Berlin
718 Páginas
Peso: 1,037 kg
Idioma: eng/Englisch
Libro en la base de datos desde 2009-03-19T06:06:05+01:00 (Madrid)
Página de detalles modificada por última vez el 2024-02-19T21:02:59+01:00 (Madrid)
ISBN/EAN: 9783642154966
ISBN - escritura alterna:
3-642-15496-4, 978-3-642-15496-6
Mode alterno de escritura y términos de búsqueda relacionados:
Autor del libro: dimitri, grit
Título del libro: 2010, computer computer, eso, european symposium, security
Datos del la editorial
Autor: Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou
Título: Lecture Notes in Computer Science; Security and Cryptology; Computer Security - ESORICS 2010 - 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
Editorial: Springer; Springer Berlin
718 Páginas
Año de publicación: 2010-08-30
Berlin; Heidelberg; DE
Idioma: Inglés
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
Available
XIV, 718 p. 163 illus.
BC; Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; Informatik; access control; anonymity; authorization; e-voting; intrusion detection; privacy; security; trust; algorithm analysis and problem complexity; Computer Communication Networks; Cryptology; Programming Techniques; IT Operations; Algorithms; Computers and Society; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Computerprogrammierung und Softwareentwicklung; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; Digital- und Informationstechnologien: soziale und ethische Aspekte; EA
RFID and Privacy.- A New Framework for RFID Privacy.- Readers Behaving Badly.- Privacy-Preserving, Taxable Bank Accounts.- Formal Analysis of Privacy for Vehicular Mix-Zones.- Software Security.- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.- A Theory of Runtime Enforcement, with Results.- Enforcing Secure Object Initialization in Java.- Flexible Scheduler-Independent Security.- Cryptographic Protocols.- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic.- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols.- Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.- DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.- Traffic Analysis.- Website Fingerprinting and Identification Using Ordered Feature Sequences.- Web Browser History Detection as a Real-World Privacy Threat.- On the Secrecy of Spread-Spectrum Flow Watermarks.- Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.- End-User Security.- A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.- Kamouflage: Loss-Resistant Password Management.- Formal Analysis.- Sequential Protocol Composition in Maude-NPA.- Verifying Security Property of Peer-to-Peer Systems Using CSP.- Modeling and Analyzing Security in the Presence of Compromising Adversaries.- On Bounding Problems of Quantitative Information Flow.- E-voting and Broadcast.- On E-Vote Integrity in the Case of Malicious Voter Computers.- Election Verifiability in Electronic Voting Protocols.- Pretty Good Democracy for More Expressive Voting Schemes.- Efficient Multi-dimensional Key Management in Broadcast Services.- Authentication, Access Control, Authorization and Attestation.- Caught in the Maze of Security Standards.- User-Role Reachability Analysis of Evolving Administrative Role Based Access Control.- An Authorization Framework Resilient to Policy Evaluation Failures.- Optimistic Fair Exchange with Multiple Arbiters.- Anonymity and Unlinkability.- Speaker Recognition in Encrypted Voice Streams.- Evaluating Adversarial Partitions.- Providing Mobile Users’ Anonymity in Hybrid Networks.- Complexity of Anonymity for Security Protocols.- Network Security and Economics.- k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.- Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.- RatFish: A File Sharing Protocol Provably Secure against Rational Users.- A Service Dependency Model for Cost-Sensitive Intrusion Response.- Secure Update, DOS and Intrustion Detection.- Secure Code Update for Embedded Devices via Proofs of Secure Erasure.- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks.- Low-Cost Client Puzzles Based on Modular Exponentiation.- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.up-to-date results fast track conference proceedings state-of-the-art report
Más, otros libros, que pueden ser muy parecidos a este:
Último libro similar:
9783642154973 Computer Security - ESORICS 2010 (Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou)
- 9783642154973 Computer Security - ESORICS 2010 (Dimitris Gritzalis; Bart Preneel; Marianthi Theoharidou)
- 9783319112121 Computer Security - ESORICS 2014 (Pedro Ponce-Cruz)
- 9783319112039 Computer Security - ESORICS 2014 (Miroslaw Kutylowski; Jaideep Vaidya)
- 9783319112114 Computer Security - ESORICS 2014 (Miroslaw Kutylowski; Jaideep Vaidya)
- 9783319112022 Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. (Miroslaw Kutylowski; Jaideep Vaidya)
< para archivar...