Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - pocketboek
2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; BEH… Meer...
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Verzendingskosten:Versandkostenfrei. (EUR 0.00) Details... |
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - pocketboek
2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 18.13], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; B… Meer...
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Verzendingskosten: EUR 18.13 Details... |
2009, ISBN: 3642108466
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Meer...
Weltbild.de Nr. 22424477. Verzendingskosten:, 2-5 Werktage, DE. (EUR 0.00) Details... |
2009, ISBN: 9783642108464
pocketboek
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As future generation info… Meer...
booklooker.de |
Security Technology: International Conference, Sectech 2009, Held As Part of the Future Generation Information Technology Conference, Fgit 2009, Jeju Island, Korea, Decemb - pocketboek
2009, ISBN: 9783642108464
Springer-Verlag New York Inc, 2009. Paperback. New. 1st edition. 308 pages. 9.00x6.00x0.50 inches., Springer-Verlag New York Inc, 2009, 6
Biblio.co.uk |
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - pocketboek
2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; BEH… Meer...
Dominik Slezak:
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - pocketboek2009, ISBN: 3642108466
[EAN: 9783642108464], Neubuch, [SC: 18.13], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; B… Meer...
2009
ISBN: 3642108466
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Meer...
2009, ISBN: 9783642108464
pocketboek
[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As future generation info… Meer...
Security Technology: International Conference, Sectech 2009, Held As Part of the Future Generation Information Technology Conference, Fgit 2009, Jeju Island, Korea, Decemb - pocketboek
2009, ISBN: 9783642108464
Springer-Verlag New York Inc, 2009. Paperback. New. 1st edition. 308 pages. 9.00x6.00x0.50 inches., Springer-Verlag New York Inc, 2009, 6
Bibliografische gegevens van het best passende boek
auteur: | |
Titel: | |
ISBN: |
Gedetalleerde informatie over het boek. - Security Technology
EAN (ISBN-13): 9783642108464
ISBN (ISBN-10): 3642108466
Gebonden uitgave
pocket book
Verschijningsjaar: 2009
Uitgever: Springer Berlin Heidelberg
308 Bladzijden
Gewicht: 0,488 kg
Taal: eng/Englisch
Boek bevindt zich in het datenbestand sinds 2009-10-17T03:06:56+02:00 (Amsterdam)
Detailpagina laatst gewijzigd op 2024-04-04T20:07:14+02:00 (Amsterdam)
ISBN/EAN: 9783642108464
ISBN - alternatieve schrijfwijzen:
3-642-10846-6, 978-3-642-10846-4
alternatieve schrijfwijzen en verwante zoekwoorden:
Auteur van het boek: slezak, tai, fang, dominik, kim chi, arnett
Titel van het boek: security 2009, joaquin sorolla, proceedings the, generation, island, science and information technology, science korea technology, science and technology and the future
Gegevens van de uitgever
Auteur: Dominik Slezak
Titel: Communications in Computer and Information Science; Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
Uitgeverij: Springer; Springer Berlin
308 Bladzijden
Verschijningsjaar: 2009-11-24
Berlin; Heidelberg; DE
Taal: Engels
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 308 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; BitTorrent; Broadcast; Code; MIMO; Partition; authentication; behavior models; communication; cryptography; malvare detection; metrics; privacy; signatures; urban computing; wireless sensors; Cryptology; Computer Communication Networks; Data Structures and Information Theory; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Engineering and Networks; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Informationstheorie; Mathematik für Informatiker; Diskrete Mathematik; Computerhardware; EA
Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.Andere boeken die eventueel grote overeenkomsten met dit boek kunnen hebben:
Laatste soortgelijke boek:
9781450320863 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V3 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)
- 9781450320863 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V3 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)
- 9781450320115 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V2 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)
- 9781450312271 IPSN 12 Proceedings of the 11th International Conference on Information Processing in Sensor Networks IPSN 12 Conference Committee Author (IPSN 12 Conference Committee)
- 9780769524979 Information Technology: 2006 3rd International Conference New Generation (Itng) (IEEE Conference Proceedings) (n/a)
- 9783642108471 Security Technology (Dominik Slezak; Tai-hoon Kim; Wai-chi Fang; Kirk P. Arnett (Hrsg.))
< naar Archief...