4
×

Statusmeldung

Artikel zum Warenkorb hinzugefügt

Security and Privacy in Dynamic Environments

Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, IFIP Advances in Information and Communication Technology 201

Erschienen am 19.11.2010, 1. Auflage 2010
160,49 €
(inkl. MwSt.)

Lieferbar innerhalb 1 - 2 Wochen

In den Warenkorb
Bibliografische Daten
ISBN/EAN: 9781441941275
Sprache: Englisch
Umfang: xvi, 494 S.
Einband: kartoniertes Buch

Beschreibung

InhaltsangabeImproving Availability of Emergency Health Information without Sacrificing Patient Privacy.- Ensuring Privacy for Buyer-Seller E-Commerce.- Authenticated Query Flooding in Sensor Networks.- A Framework for Web Services Trust.- Security-by-Ontology: A Knowledge-Centric Approach.- Analysis and Improvement of Anti-Phishing Schemes.- Protecting Web Services from DOS Attacks by SOAP Message Validation.- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.- Sealed-Bid Micro Auctions.-Detecting Known and Novel Network Intrusions.-A Usability Study of Security Policy Management.- Utilizing the Common Criteria for Advanced Student Research Projects.- Click Passwords.- Secure Fast Handover in an Open Broadband Access Network Using Kerberos-Style Tickets.- Network Forensics on Packet Fingerprints.- Organizational Security Culture: More Than Just an End-User Phenomenon.-Value-Focused Assessment of Unformation Communication and Technology Security Awareness in an Academic Environment.- Practical Private Regular Expression Matching.

Produktsicherheitsverordnung

Hersteller:
Springer Verlag GmbH
juergen.hartmann@springer.com
Tiergartenstr. 17
DE 69121 Heidelberg

Inhalt

Improving Availability of Emergency Health Information without Sacrificing Patient Privacy.- Ensuring Privacy for Buyer-Seller E-Commerce.- Authenticated Query Flooding in Sensor Networks.- A Framework for Web Services Trust.- Security-by-Ontology: A Knowledge-Centric Approach.- Analysis and Improvement of Anti-Phishing Schemes.- Protecting Web Services from DOS Attacks by SOAP Message Validation.- A Synchronous Multi-Party Contract Signing Protocol Improving Lower Bound of Steps.- Sealed-Bid Micro Auctions.-Detecting Known and Novel Network Intrusions.-A Usability Study of Security Policy Management.- Utilizing the Common Criteria for Advanced Student Research Projects.- Click Passwords.- Secure Fast Handover in an Open Broadband Access Network Using Kerberos-Style Tickets.- Network Forensics on Packet Fingerprints.- Organizational Security Culture: More Than Just an End-User Phenomenon.-Value-Focused Assessment of Unformation Communication and Technology Security Awareness in an Academic Environment.- Practical Private Regular Expression Matching.

Weitere Artikel aus der Kategorie "Informatik, EDV/Allgemeines, Lexika"

Alle Artikel anzeigen