注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全通信与多媒体安全 CMS 2006/会议录LNCS-4237

通信与多媒体安全 CMS 2006/会议录LNCS-4237

通信与多媒体安全 CMS 2006/会议录LNCS-4237

定 价:¥711.90

作 者: Herbert Leitold 著
出版社: 湖南文艺出版社
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540478201 出版时间: 2006-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.)

作者简介

暂缺《通信与多媒体安全 CMS 2006/会议录LNCS-4237》作者简介

图书目录

Advances in Network and Information Security
Computing of Trust in Ad-Hoc Networks
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
On the Privacy Risks of Publishing Anonymized IP Network Traces
Secure Mobile Notifications of Civilians in Case of a Disaster
A Fair Anonymous Submission and Review System
Attribute Delegation Based on Ontologies and Context Information
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Perturbing and Protecting a Traceable Block Cipher
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
Timed Release Cryptography from Bilinear Pairings Using Hash Chains
Compression of Encrypted Visual Data
Selective Encryption for Hierarchical MPEG
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods
A Flexible and Open DRM Framework
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
A Privacy Agent in Context-Aware Ubiquitous Computing Environments
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems
Attack Graph Based Evaluation of Network Security
Information Modeling for Automated Risk Analysis
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Author Index

本目录推荐