Inicio > > Seguridad informática > Security Protocols XVII
Security Protocols XVII

Security Protocols XVII

 

65,86 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2013
Materia
Seguridad informática
ISBN:
9783642362125
65,86 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was 'Brief Encounters'. In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Artículos relacionados

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
  • Effective Cybersecurity Operations for Enterprise-Wide Systems
    Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on...
    Disponible

    248,86 €

  • IT for Business
    John Young
    IT for Business: A Student’s Guide to the Technology of Business provides readers with a comprehensive understanding of the role and application of information technology in the business world. Each chapter in the book focuses on a different aspect of IT as it relates to business. The opening chapter sets the stage by discussing the importance of developing a keen understanding...
    Disponible

    140,50 €

  • Evolution of Cross-Sector Cyber Intelligent Markets
    Eugene J. Lewis
    In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of the...
    Disponible

    275,51 €