注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全通信與多媒體安全 CMS 2006/會(huì)議錄LNCS-4237

通信與多媒體安全 CMS 2006/會(huì)議錄LNCS-4237

通信與多媒體安全 CMS 2006/會(huì)議錄LNCS-4237

定 價(jià):¥711.90

作 者: Herbert Leitold 著
出版社: 湖南文藝出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書(shū)可以去


ISBN: 9783540478201 出版時(shí)間: 2006-12-01 包裝: 平裝
開(kāi)本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.)

作者簡(jiǎn)介

暫缺《通信與多媒體安全 CMS 2006/會(huì)議錄LNCS-4237》作者簡(jiǎn)介

圖書(shū)目錄

Advances in Network and Information Security
Computing of Trust in Ad-Hoc Networks
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
On the Privacy Risks of Publishing Anonymized IP Network Traces
Secure Mobile Notifications of Civilians in Case of a Disaster
A Fair Anonymous Submission and Review System
Attribute Delegation Based on Ontologies and Context Information
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Perturbing and Protecting a Traceable Block Cipher
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
Timed Release Cryptography from Bilinear Pairings Using Hash Chains
Compression of Encrypted Visual Data
Selective Encryption for Hierarchical MPEG
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods
A Flexible and Open DRM Framework
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
A Privacy Agent in Context-Aware Ubiquitous Computing Environments
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems
Attack Graph Based Evaluation of Network Security
Information Modeling for Automated Risk Analysis
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)