Cantitate/Preț
Produs

Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers: Lecture Notes in Computer Science, cartea 9092

Editat de Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
en Limba Engleză Paperback – 3 feb 2016
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33990 lei

Preț vechi: 42487 lei
-20% Nou

Puncte Express: 510

Preț estimativ în valută:
6505 6863$ 5421£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319281650
ISBN-10: 3319281658
Pagini: 698
Ilustrații: XVIII, 698 p. 152 illus. in color.
Dimensiuni: 155 x 235 x 37 mm
Greutate: 0.99 kg
Ediția:1st ed. 2015
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Secure computation: primitives and new models.- Public key cryptographic primitives.- Secure computation II: applications.- Anonymity and related applications.- Cryptanalysis and attacks (symmetric crypto).- Privacy and policy enforcement.- Authentication via eye tracking and proofs of proximity.- Malware analysis and side channel attacks.- Side channel countermeasures and tamper resistance/PUFs.- Leakage resilience and pseudorandomness.


Caracteristici

Includes supplementary material: sn.pub/extras