Get Free Shipping on orders over $79
Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers - Dong Hoon Lee

Information Security Applications

13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

By: Dong Hoon Lee (Editor), Moti Yung (Editor)

Paperback | 13 November 2012

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

Security on LBlock against Biclique Cryptanalysis.- Improved Impossible Differential Attacks on Reduced-Round MISTY1.- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.- Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.- Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.- Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption.- Improved Differential Fault Analysis on Block Cipher ARIA.- Multi-Level Controlled Signature.- Tate Pairing Computation on Generalized Hessian Curves.- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.- An Authentication and Key Management Scheme for the Proxy Mobile IPv6.- Payment Approval for PayWord.- Anonymity-Based Authenticated Key Agreement with Full Binding Property.- A Study for Classification of Web Browser Log and Timeline Visualization.- Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT Investigations.- An Efficient Filtering Method for Detecting Malicous Web Pages.- Lightweight Client-Side Methods for Detecting Email Forgery.- AIGG Threshold Based HTTP GET Flooding Attack Detection.- Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.- Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice.- On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.- Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.- A Trust Management Model for QoS-Based Service Selection.- Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems.

More in Network Hardware

Bluetooth LE Audio : Fundamental to Recent Advances - Himanshu Bhalla

RRP $183.00

$162.75

11%
OFF
Practical Monitoring : Effective Strategies for the Real World - Mike Julian
Designing Embedded Hardware 2e : O'Reilly Ser. - John Catsoulis

RRP $95.00

$43.75

54%
OFF
Cisco IOS in a Nutshell : In a Nutshell - James Boney

RRP $75.99

$30.00

61%
OFF
UNIX in a Nutshell : In a Nutshell - Arnold Robbins

RRP $85.75

$43.75

49%
OFF
Computer Viruses and Malware : Advances In Information Security - John Aycock
JUNOS Cookbook : Cookbooks (O'Reilly) - Aviva Garrett

RRP $104.75

$41.00

61%
OFF
Getting Started with Bluetooth Low Energy - Carles Cufi Akiba

RRP $85.75

$34.00

60%
OFF
Juniper QFX5100 Series - Douglas Richard, Jr. Hanks

RRP $114.00

$45.00

61%
OFF
JUNOS Enterprise Switching : OREILLY - Harry Reynolds

RRP $133.00

$53.00

60%
OFF
Getting Started with Netduino : OREILLY - Chris Walker

RRP $38.00

$15.00

61%
OFF
Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
Cryptocurrency Mining For Dummies : 2nd Edition - Peter Kent

RRP $49.95

$42.75

14%
OFF
Android Smartphones For Dummies : For Dummies - Jerome DiMarzio

RRP $49.95

$42.75

14%
OFF