Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings: Lecture Notes in Computer Science, cartea 5536
Editat de Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnauden Limba Engleză Paperback – 25 mai 2009
Din seria Lecture Notes in Computer Science
- 20% Preț: 1021.30 lei
- 20% Preț: 337.03 lei
- 20% Preț: 340.22 lei
- 20% Preț: 256.27 lei
- 20% Preț: 324.32 lei
- 20% Preț: 438.69 lei
- 20% Preț: 315.78 lei
- 20% Preț: 327.52 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 557.41 lei
- 20% Preț: 561.37 lei
- 15% Preț: 558.56 lei
- 20% Preț: 238.01 lei
- 20% Preț: 504.57 lei
- 20% Preț: 329.09 lei
- 20% Preț: 563.75 lei
- 20% Preț: 630.24 lei
- 20% Preț: 321.96 lei
- 20% Preț: 1361.10 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.39 lei
- Preț: 366.90 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.19 lei
- 20% Preț: 985.59 lei
- 20% Preț: 620.87 lei
- 20% Preț: 436.22 lei
- 20% Preț: 734.34 lei
- 20% Preț: 1034.49 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 573.92 lei
- 20% Preț: 301.95 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 327.52 lei
- 20% Preț: 794.65 lei
- 20% Preț: 569.16 lei
- Preț: 395.43 lei
- 20% Preț: 1138.26 lei
- 20% Preț: 734.34 lei
- 20% Preț: 315.78 lei
- 20% Preț: 330.70 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.98 lei
Preț: 390.77 lei
Nou
Puncte Express: 586
Preț estimativ în valută:
74.79€ • 78.90$ • 62.33£
74.79€ • 78.90$ • 62.33£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642019562
ISBN-10: 3642019560
Pagini: 552
Ilustrații: XIII, 535 p.
Dimensiuni: 155 x 235 x 35 mm
Greutate: 0.84 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642019560
Pagini: 552
Ilustrații: XIII, 535 p.
Dimensiuni: 155 x 235 x 35 mm
Greutate: 0.84 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Key Exchange.- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior.- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.- Secure Computation.- Novel Precomputation Schemes for Elliptic Curve Cryptosystems.- Practical Secure Evaluation of Semi-private Functions.- Secure Hamming Distance Based Computation and Its Applications.- Efficient Robust Private Set Intersection.- Public-Key Encryption.- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.- An Efficient Identity-Based Online/Offline Encryption Scheme.- Dual-Policy Attribute Based Encryption.- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.- Network Security I.- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.- Traitor Tracing.- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.- Tracing and Revoking Pirate Rebroadcasts.- Authentication and Anonymity.- Efficient Deniable Authentication for Signatures.- Homomorphic MACs: MAC-Based Integrity for Network Coding.- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks.- Hash Functions.- Cryptanalysis of Twister.- Cryptanalysis of CubeHash.- Collision Attack on Boole.- Network Security II.- Integrity Protection for Revision Control.- Fragility of the Robust Security Network: 802.11 Denial of Service.- Fast Packet Classification Using Condition Factorization.- Lattices.- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.- Broadcast Attacks against Lattice-Based Cryptosystems.- Partial Key Exposure Attack on CRT-RSA.- Side-Channel Attacks.- How to Compare Profiled Side-Channel Attacks?.- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.- Attacking ECDSA-Enabled RFID Devices.
Textul de pe ultima copertă
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.
The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.