Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_894515640
    Format: 1 Online-Ressource (ix, 263 pages) , illustrations
    Edition: [S.l.] HathiTrust Digital Library Electronic reproduction
    ISBN: 0769510485 , 0769510469 , 0769510477 , 9780769510484 , 9780769510460 , 9780769510477
    Note: "IEEE Computer Society Order Number PR01046"--Title page verso , Includes bibliographical references and author index , Use copy Restrictions unspecified star MiAaHDL , Session 1 Tamper-Resistance and Cryptography ; Cryptographic Security for Mobile Code , Networked Cryptographic Devices Resilient to Capture , Protection of Keys against Modification Attack , Session 2 Intrusion and Anomaly Detection I ; Data Mining Methods for Detection of New Malicious Executables , Evaluation of Intrusion Detectors: A Decision Theory Approach , Session 3 Information Flow ; On Confidentiality and Algorithms , Preserving Information Flow Properties under Refinement , Session 4 Access Control and Trust Management ; Understanding Trust Management Systems , SD3: A Trust Management System with Certified Evaluation , Formal Treatment of Certificate Revocation under Communal Access Control , Session 5 Intrusion and Anomaly Detection II ; Information-Theoretic Measures for Anomaly Detection , A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors , Intrusion Detection via Static Analysis , Session 6 Cryptographic Protocols I ; Performance of Public-Key-Enabled Kerberos Authentication in Large Networks , A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission , Session 7 What's Really Different ; Cryptographic Key Generation from Voice , A Trend Analysis of Exploitations , Reverse Engineering: A Legal Right or Wrong? , Session 8 Cryptographic Protocols II ; Graph-Based Authentication of Digital Streams , ELK, A New Protocol for Efficient Large-Group Key Distribution , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    Additional Edition: Print version IEEE Symposium on Security and Privacy (2001 : Oakland, Calif.) 2001 IEEE Symposium on Security and Privacy Los Alamitos, Calif : IEEE Computer Society, ©2001
    Language: English
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages