Sold Out
Book Categories |
INTRODUCTION, D. T. Lee, S. P. Shieh, J. D. Tygar. -PART I: SECURITY PROTOCOL DESIGN. -Challenges in Prool Design and Analysis, Dieter Gollmann. —Private Matching,Yaping Li, J. D. Tygar, Joseph M. Hellerstein. -Authentication Prool Analysis, Jonathan Millen. -Self-certified Approach for Authenticated Key Agreement, Tzong-Chen Wu, Yen-Ching Lin. -PART II P2P AND AD HOC NETWORKS. -Experimenting with Admission Control in P2P Networks, Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi -Adaptive Random Key Distribution Schemes for Wireless Sensor Networks, Shih-I Huang, Shiuhpyng Shieh, S.Y. Wu. -PART III INTRUSION DETECTION, DEFENSE, MEASUREMENT. -Measuring Relative Attack Surfaces, Michael Howard, Jon Pincus, Jeannette M. Wing. -A Modeling of Intrusion Detection Systems with Identification Capability, Pei-Te Chen, Benjamin Tseng, Chi-Sung Laih. -A Source-End Defense System against DDoS Attacks, Fu-Yuan Lee, Shiuhpyng Shieh, JuiTing Shieh, Sheng-Hsuan Wang. -BEAGLE: Tracking System Failures for Reproducing Security Faults, Chang-Hsien Tsai, Shih-Hung Liu, Shuen-Wen Huang, Shih-Kun Huang, Deron Liang. -Part IV MULTIMEDIA SECURITY. -Web Application Security-Past, Present, and Future, Yao-Wen Huang, D. T. Lee. -Securing JPEG2000 CodeStreams, Robert H. Deng, Yongdong Wu, Di Ma. -A Secret Information Hiding Scheme Based on Switching Tree Coding, Chin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu .
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionComputer Security in the 21st Century
X
This Item is in Your InventoryComputer Security in the 21st Century
X
You must be logged in to review the productsX
X
X
Add Computer Security in the 21st Century, Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de, Computer Security in the 21st Century to the inventory that you are selling on WonderClubX
X
Add Computer Security in the 21st Century, Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security prool design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion de, Computer Security in the 21st Century to your collection on WonderClub |