Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6123
Editat de Jianying Zhou, Moti Yungen Limba Engleză Paperback – 9 iun 2010
Din seria Lecture Notes in Computer Science
- 20% Preț: 1053.72 lei
- 20% Preț: 337.82 lei
- 20% Preț: 339.43 lei
- 20% Preț: 449.99 lei
- 20% Preț: 238.01 lei
- 20% Preț: 337.82 lei
- 20% Preț: 438.69 lei
- Preț: 446.28 lei
- 20% Preț: 341.10 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 640.52 lei
- 17% Preț: 427.22 lei
- 20% Preț: 650.20 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1067.33 lei
- 20% Preț: 587.17 lei
- Preț: 378.43 lei
- 20% Preț: 334.54 lei
- 15% Preț: 435.36 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1404.34 lei
- 20% Preț: 1016.88 lei
- 20% Preț: 575.04 lei
- 20% Preț: 575.48 lei
- 20% Preț: 579.12 lei
- 20% Preț: 757.61 lei
- 15% Preț: 576.20 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 350.92 lei
- 20% Preț: 581.57 lei
- Preț: 407.85 lei
- 20% Preț: 592.06 lei
- 20% Preț: 757.61 lei
- 20% Preț: 819.86 lei
- 20% Preț: 649.49 lei
- 20% Preț: 347.62 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 510.68 lei
Preț vechi: 638.35 lei
-20% Nou
Puncte Express: 766
Preț estimativ în valută:
97.78€ • 100.30$ • 82.32£
97.78€ • 100.30$ • 82.32£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642137075
ISBN-10: 3642137075
Pagini: 577
Ilustrații: XIII, 564 p. 83 illus.
Greutate: 1.02 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642137075
Pagini: 577
Ilustrații: XIII, 564 p. 83 illus.
Greutate: 1.02 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public Key Encryption.- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.- How to Construct Interval Encryption from Binary Tree Encryption.- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.- Digital Signature.- Trapdoor Sanitizable Signatures Made Easy.- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.- Redactable Signatures for Tree-Structured Data: Definitions and Constructions.- Block Ciphers and Hash Functions.- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions.- Multi-trail Statistical Saturation Attacks.- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G???.- High Performance GHASH Function for Long Messages.- Side-Channel Attacks.- Principles on the Security of AES against First and Second-Order Differential Power Analysis.- Adaptive Chosen-Message Side-Channel Attacks.- Secure Multiplicative Masking of Power Functions.- Zero Knowledge and Multi-party Protocols.- Batch Groth–Sahai.- Efficient and Secure Evaluation of Multivariate Polynomials and Applications.- Efficient Implementation of the Orlandi Protocol.- Improving the Round Complexity of Traitor Tracing Schemes.- Key Management.- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.- Deniable Internet Key Exchange.- Authentication and Identification.- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm.- Secure Sketch for Multiple Secrets.- A Message Recognition Protocol Based on Standard Assumptions.- Privacy and Anonymity.- Affiliation-Hiding Key Exchange with Untrusted Group Authorities.- Privacy-Preserving Group Discovery with Linear Complexity.- Two New Efficient PIR-Writing Protocols.- Regulatory Compliant Oblivious RAM.- RFID Security and Privacy.- Revisiting Unpredictability-Based RFID Privacy Models.- OnRFID Privacy with Mutual Authentication and Tag Corruption.- Internet Security.- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.- COP: A Step toward Children Online Privacy.- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.