Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    gbv_894515640
    Umfang: 1 Online-Ressource (ix, 263 pages) , illustrations
    Ausgabe: [S.l.] HathiTrust Digital Library Electronic reproduction
    ISBN: 0769510485 , 0769510469 , 0769510477 , 9780769510484 , 9780769510460 , 9780769510477
    Anmerkung: "IEEE Computer Society Order Number PR01046"--Title page verso , Includes bibliographical references and author index , Use copy Restrictions unspecified star MiAaHDL , Session 1 Tamper-Resistance and Cryptography ; Cryptographic Security for Mobile Code , Networked Cryptographic Devices Resilient to Capture , Protection of Keys against Modification Attack , Session 2 Intrusion and Anomaly Detection I ; Data Mining Methods for Detection of New Malicious Executables , Evaluation of Intrusion Detectors: A Decision Theory Approach , Session 3 Information Flow ; On Confidentiality and Algorithms , Preserving Information Flow Properties under Refinement , Session 4 Access Control and Trust Management ; Understanding Trust Management Systems , SD3: A Trust Management System with Certified Evaluation , Formal Treatment of Certificate Revocation under Communal Access Control , Session 5 Intrusion and Anomaly Detection II ; Information-Theoretic Measures for Anomaly Detection , A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors , Intrusion Detection via Static Analysis , Session 6 Cryptographic Protocols I ; Performance of Public-Key-Enabled Kerberos Authentication in Large Networks , A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission , Session 7 What's Really Different ; Cryptographic Key Generation from Voice , A Trend Analysis of Exploitations , Reverse Engineering: A Legal Right or Wrong? , Session 8 Cryptographic Protocols II ; Graph-Based Authentication of Digital Streams , ELK, A New Protocol for Efficient Large-Group Key Distribution , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    Weitere Ausg.: Print version IEEE Symposium on Security and Privacy (2001 : Oakland, Calif.) 2001 IEEE Symposium on Security and Privacy Los Alamitos, Calif : IEEE Computer Society, ©2001
    Sprache: Englisch
    Schlagwort(e): Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz