Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Fachgebiete(RVK)
Zugriff
  • 1
    UID:
    almahu_9949972420902882
    Umfang: XII, 268 p. 77 illus. , online resource.
    Ausgabe: 1st ed. 2005.
    ISBN: 9780387240060
    Inhalt: Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of : * Fundamental new security * Cryptographic protocols and design, * A new way of measuring network vulnerability: attack surfaces, * Network vulnerability and building impenetrable systems, * Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns. ABOUT THE AUTHORS D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security. S. P. Shieh is a Professor and former Chair of the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems. J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department's Study Group on Security withPrivacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management. .
    Anmerkung: Security Protocol Design -- Challenges in Protocol Design and Analysis -- Private Matching -- Authentication Protocol Analysis -- Self-Certified Approach for Authenticated Key Agreement -- P2P and Ad Hoc Networks -- Experimenting with Admission Control in P2P Networks -- Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- Intrusion Detection, Defense, Measurement -- Measuring Relative Attack Surfaces -- A Modeling of Intrusion Detection Systems with Identification Capability -- A Source-End Defense System Against DDoS Attacks -- Beagle: Tracking System Failures for Reproducing Security Faults -- Multimedia Security -- Web Application Security-Past, Present, and Future -- Securing JPEG2000 Code-Streams -- A Secret Information Hiding Scheme Based on Switching Tree Coding.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9780387240053
    Weitere Ausg.: Printed edition: ISBN 9780387504131
    Weitere Ausg.: Printed edition: ISBN 9781441936790
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    [Berlin u.a.] : Springer
    UID:
    b3kat_BV022390094
    Umfang: 1 Online-Ressource (XII, 268 S.) , graph. Darst.
    ISBN: 0387240055 , 9780387240053 , 9780387240060
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Computersicherheit ; Konferenzschrift
    Mehr zum Autor: Lee, Der-Tsai 1949-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9780387241760?
Meinten Sie 9780387243061?
Meinten Sie 9780387240800?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz