Cantitate/Preț
Produs

Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II: Lecture Notes in Computer Science, cartea 12727

Editat de Kazue Sako, Nils Ole Tippenhauer
en Limba Engleză Paperback – 10 iun 2021
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows:
Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography;
Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 30768 lei  3-5 săpt. +2994 lei  7-11 zile
  Springer International Publishing – 9 iun 2021 30768 lei  3-5 săpt. +2994 lei  7-11 zile
  Springer International Publishing – 10 iun 2021 53202 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 53202 lei

Preț vechi: 66503 lei
-20% Nou

Puncte Express: 798

Preț estimativ în valută:
10181 10711$ 8429£

Carte tipărită la comandă

Livrare economică 14-28 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030783747
ISBN-10: 303078374X
Pagini: 512
Ilustrații: XIV, 512 p. 125 illus., 77 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.73 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Analysis of Applied Systems.- Breaking and Fixing Third-Party Payment Service for Mobile Apps.- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library.- Secure Computations.- Privacy-Preserving Data Aggregation with Probabilistic Range Validation.- LLVM-based Circuit Compilation for Practical Secure Computation.- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings.- Cryptanalysis.- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.- Efficient Methods to Search for Best Differential Characteristics on SKINNY.- Towards Efficient LPN-Based Symmetric Encryption.- System Security.- A Differentially Private Hybrid Approach to Traffic Monitoring.- Proactive Detection of Phishing Kit Traffic.- Vestige: Identifying Binary Code Provenance for Vulnerability Detection.- SoK: Auditability and Accountability in DistributedPayment Systems.- Defending Web Servers Against Flash Crowd Attacks.- Cryptography and its Applications.- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures.- Cryptanalysis of the Binary Permuted Kernel Problem.- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms.- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.- Improved Structured Encryption for SQL Databases via Hybrid Indexing.