Atjaunināt sīkdatņu piekrišanu

Information Security: 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings 2014 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 570 pages, height x width: 235x155 mm, weight: 8774 g, 95 Illustrations, black and white; XVIII, 570 p. 95 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 8783
  • Izdošanas datums: 20-Nov-2014
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319132563
  • ISBN-13: 9783319132563
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 570 pages, height x width: 235x155 mm, weight: 8774 g, 95 Illustrations, black and white; XVIII, 570 p. 95 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 8783
  • Izdošanas datums: 20-Nov-2014
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319132563
  • ISBN-13: 9783319132563

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Public-Key Encryption.- Authentication.- Symmetric Key Cryptography.-
Zero-Knowledge Proofs and Arguments.- Outsourced and Multi-party
Computations.- Implementation.- Information Leakage.- Firewall and
Forensics.- Web Security.- Android Security.