Cantitate/Preț
Produs

Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I: Lecture Notes in Computer Science, cartea 12726

Editat de Kazue Sako, Nils Ole Tippenhauer
en Limba Engleză Paperback – 9 iun 2021
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows:
Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography;
Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 30771 lei  3-5 săpt. +2992 lei  6-12 zile
  Springer International Publishing – 9 iun 2021 30771 lei  3-5 săpt. +2992 lei  6-12 zile
  Springer International Publishing – 10 iun 2021 52249 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 30771 lei

Preț vechi: 38464 lei
-20% Nou

Puncte Express: 462

Preț estimativ în valută:
5889 6213$ 4908£

Carte disponibilă

Livrare economică 12-26 decembrie
Livrare express 27 noiembrie-03 decembrie pentru 3991 lei

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030783716
ISBN-10: 3030783715
Pagini: 482
Ilustrații: XIV, 482 p. 72 illus., 21 illus. in color.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.69 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Cryptographic Protocols.- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles.- Analysis of Client-side Security for Long-term Time-stamping Services.- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.- Secure and Fair Protocols.- CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning.- Blind Polynomial Evaluation and Data Trading.- Coin-Based Multi-Party Fair Exchange.- Cryptocurrency and Smart Contracts.- P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange.- WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets.- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.- Digital Signatures.- Unlinkable and Invisible -Sanitizable Signatures.- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More.- An Efficient Certificate-Based Signature Scheme in the Standard Model.- Embedded System Security.- SnakeGX: a sneaky attack against SGX Enclaves.- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks.- Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems.- Lattice Cryptography.- Access Control Encryption from Group Encryption.- Password Protected Secret Sharing from Lattices.- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts.