Computer and Communications Security, emne: it og

Udgiver: Michael B.
Pris: 90 kr.
Adresse: 2625 Vallensbæk
2015-28-07
Udsigt: 21
Løbenummer:xwen8m6x
Når du kontakter os, så fortæl mig, at du se de oplysninger fra datezr.com.
Billeder
Klik på billedet for at forstørre

Computer and Communications Security, emne: it og grafik

Udgivet af ACM SIGSAC.

Fulde titel: "Proceedings ths the 16th ACM Conference on Computer and Communications Security"

ISBN 10: 1605583529 / ISBN 13: 9781605583525
650 sider

Nypris $89 - se http://www.abebooks.com/servlet/BookDetailsPL?bi=6967723073

(1) Martin Albrecht, Craig Gentry, Shai Halevi and Jonathan Katz.
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"

(2) Mudhakar Srivatsa.
A Calculus Approach to Secure Information Sharing

(3) K Vikram, Abhishek Prateek and Benjamin Livshits.
Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution

(4) Claude Castelluccia, Aur?lien Francillon, Daniele Perito and Claudio Soriente.
On the Difficulty of Software-Based Attestation of Embedded Devices

(5) Steffen Reidt, Mudhakar Srivatsa and Shane Balfe.
The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks

(6) Masana Murase, Wilfred Plouffe, Masaharu Sakamoto and Kanna Shimizu.
Effective Implementation of the Cell Broadband Engine(TM) Isolation Loader

(7) Changshe Ma, Yingjiu Li, Robert Deng and Tieyan Li.
RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction

(8) Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund and Thomas Walter.
Filter-resistant code injection on RISC

(9) Andriy Panchenko, Arne Rache and Stefan Richter.
NISAN: Network Information Service for Anonymization Networks

(10) Cedric Fournet, Gurvan Le Guernic and Tamara Rezk.
A Security-Preserving Compiler for Distributed Programs

(11) xinran wang, Yoon-Chan Jhi, Sencun Zhu and Peng Liu.
Behavior Based Software Theft Detection

(12) Dario Catalano, Dario Fiore and Rosario Gennaro.
Certificateless Onion Routing

(13) Yao Liu, Peng Ning and Michael Reiter.
False Data Injection Attacks against State Estimation in Electric Power Grids

(15) Olivier Billet, Jonathan Etrog and Henri Gilbert.
An Efficient Forward-Private RFID Protocol

... og mange andre artikler ...



Titel: Computer and Communications Security
Kategori: it og grafik