Yair Frankel - Böcker
Visar alla böcker från författaren Yair Frankel. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Information Security
4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings
Häftad, Engelska, 2001
552 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 4th international Information Security Conference, ISC 2001, held in Malaga, Spain in October 2001. The 37 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections on key distribution, protocols, enhancing technologies, privacy, software protection, message hiding, PKI issues and protocols, hardware/software implementations, cryptanalysis and prevention, implementations, non-repudiation techniques, and contracts and auctions.
Financial Cryptography
4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings
Häftad, Engelska, 2001
552 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereed post-proceedings of the 4th International Conference on Financial Cryptography, FC 2000, held in Anguilla, British West Indies, in February 2000. The 21 revised full papers presented together with two invited papers and two tool summaries were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on digitial rights management, payment systems, finanical cryptography tools, electronic postcards, abusers of systems, financial cryptopolicies and issues, anonymity, and systems architecture.
Infrastructure Security
International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings
Häftad, Engelska, 2002
552 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the Infrastructure Security Conference, InfraSec 2002, held in Bristol, UK in October 2002. The 23 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on biometrics; identification, authentication, and process; analysis process; mobile networks; vulnerability assessment and logs; systems design; formal methods; cryptographic techniques, and networks.