- Format
- Häftad (Paperback / softback)
- Språk
- Engelska
- Antal sidor
- 273
- Utgivningsdatum
- 2012-04-23
- Upplaga
- 2012 ed.
- Förlag
- Springer-Verlag Berlin and Heidelberg GmbH & Co. K
- Medarbetare
- Laud, Peeter (ed.)
- Illustratör/Fotograf
- Bibliographie 84 schwarz-weiße Abbildungen
- Illustrationer
- 84 Illustrations, black and white; X, 273 p. 84 illus.
- Dimensioner
- 231 x 155 x 15 mm
- Vikt
- Antal komponenter
- 1
- Komponenter
- 1 Paperback / softback
- ISBN
- 9783642296147
- 431 g
Du kanske gillar
-
Man And His Symbols
C G Jung
HäftadInformation Security Technology for Applications
16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers
av Peeter Laud609- Skickas inom 3-6 vardagar.
- Gratis frakt inom Sverige över 199 kr för privatpersoner.
Finns även somPassar bra ihop
De som köpt den här boken har ofta också köpt C Programming Language av Brian W Kernighan, Dennis Ritchie (häftad).
Köp båda 2 för 1252 krKundrecensioner
Har du läst boken? Sätt ditt betyg »Fler böcker av Peeter Laud
-
Applications of Secure Multiparty Computation
Peeter Laud, Liina Kamm
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be o...
Innehållsförteckning
Invited Papers.-Designing a Governmental Backbone.-Internet Voting in Estonia.-Contributed Papers.-A Ring Based Onion Circuit for Hidden Services.-User Tracking on the Web via Cross-Browser Fingerprinting.-Comparison of SRAM and FF PUF in 65nm Technology.-Modular Anomaly Detection for Smartphone Ad Hoc Communication.-Mental Voting Booths.-Methods for Privacy Protection Considering Status of Service Provider and User Community.-The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor.-Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy Features.-Optimized Inlining of Runtime Monitors.-Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service.-Feature Reduction to Speed Up Malware Classification.-Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible Service.-An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks.-Disjunction Category Labels.-Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting.-Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations.-