Cantitate/Preț
Produs

Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers: Lecture Notes in Computer Science, cartea 9092

Editat de Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
en Limba Engleză Paperback – 3 feb 2016
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 35320 lei

Preț vechi: 44149 lei
-20% Nou

Puncte Express: 530

Preț estimativ în valută:
6760 7031$ 5665£

Carte tipărită la comandă

Livrare economică 14-28 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319281650
ISBN-10: 3319281658
Pagini: 698
Ilustrații: XVIII, 698 p. 152 illus. in color.
Dimensiuni: 155 x 235 x 37 mm
Greutate: 0.99 kg
Ediția:1st ed. 2015
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Secure computation: primitives and new models.- Public key cryptographic primitives.- Secure computation II: applications.- Anonymity and related applications.- Cryptanalysis and attacks (symmetric crypto).- Privacy and policy enforcement.- Authentication via eye tracking and proofs of proximity.- Malware analysis and side channel attacks.- Side channel countermeasures and tamper resistance/PUFs.- Leakage resilience and pseudorandomness.


Caracteristici

Includes supplementary material: sn.pub/extras