Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II: Lecture Notes in Computer Science, cartea 12727
Editat de Kazue Sako, Nils Ole Tippenhaueren Limba Engleză Paperback – 10 iun 2021
The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows:
Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography;
Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 307.71 lei 3-5 săpt. | +29.92 lei 6-10 zile |
Springer International Publishing – 9 iun 2021 | 307.71 lei 3-5 săpt. | +29.92 lei 6-10 zile |
Springer International Publishing – 10 iun 2021 | 542.99 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 340.32 lei
- 20% Preț: 341.95 lei
- 20% Preț: 453.32 lei
- 20% Preț: 238.01 lei
- 20% Preț: 340.32 lei
- 20% Preț: 438.69 lei
- Preț: 449.57 lei
- 20% Preț: 343.62 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 645.28 lei
- 17% Preț: 427.22 lei
- 20% Preț: 655.02 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 591.51 lei
- Preț: 381.21 lei
- 20% Preț: 337.00 lei
- 15% Preț: 438.59 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 575.48 lei
- 20% Preț: 583.40 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 353.50 lei
- 20% Preț: 585.88 lei
- Preț: 410.88 lei
- 20% Preț: 596.46 lei
- 20% Preț: 763.23 lei
- 20% Preț: 825.93 lei
- 20% Preț: 649.49 lei
- 20% Preț: 350.21 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 542.99 lei
Preț vechi: 678.73 lei
-20% Nou
Puncte Express: 814
Preț estimativ în valută:
103.92€ • 107.20$ • 87.95£
103.92€ • 107.20$ • 87.95£
Carte tipărită la comandă
Livrare economică 05-19 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030783747
ISBN-10: 303078374X
Pagini: 512
Ilustrații: XIV, 512 p. 125 illus., 77 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 303078374X
Pagini: 512
Ilustrații: XIV, 512 p. 125 illus., 77 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Analysis of Applied Systems.- Breaking and Fixing Third-Party Payment Service for Mobile Apps.- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library.- Secure Computations.- Privacy-Preserving Data Aggregation with Probabilistic Range Validation.- LLVM-based Circuit Compilation for Practical Secure Computation.- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings.- Cryptanalysis.- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.- Efficient Methods to Search for Best Differential Characteristics on SKINNY.- Towards Efficient LPN-Based Symmetric Encryption.- System Security.- A Differentially Private Hybrid Approach to Traffic Monitoring.- Proactive Detection of Phishing Kit Traffic.- Vestige: Identifying Binary Code Provenance for Vulnerability Detection.- SoK: Auditability and Accountability in DistributedPayment Systems.- Defending Web Servers Against Flash Crowd Attacks.- Cryptography and its Applications.- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures.- Cryptanalysis of the Binary Permuted Kernel Problem.- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms.- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.- Improved Structured Encryption for SQL Databases via Hybrid Indexing.