Stig F. Mjølsnes - Böcker
Visar alla böcker från författaren Stig F. Mjølsnes. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Del 9393 - Lecture Notes in Computer Science
Technology and Practice of Passwords
International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers
Häftad, Engelska, 2015
443 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions.
Del 9551 - Lecture Notes in Computer Science
Technology and Practice of Passwords
9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings
Häftad, Engelska, 2016
465 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed post-conferenceproceedings of the 9th International Conference on Passwords, PASSWORDS2015, held in Cambridge, UK, in December 2015.The 6 revised full papers presented together with 3 revised short paperswere carefully reviewed and selected from 32 initial submissions. Thepapers are organized in topical sections on human factors, attacks, and cryptography.
Public Key Infrastructure
5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings
Häftad, Engelska, 2008
552 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008. The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.