Information Security and Privacy: 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II: Lecture Notes in Computer Science, cartea 14896
Editat de Tianqing Zhu, Yannan Lien Limba Engleză Paperback – 16 iul 2024
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 471.49 lei 43-57 zile | |
Springer Nature Singapore – 16 iul 2024 | 471.49 lei 43-57 zile | |
Springer Nature Singapore – 15 iul 2024 | 811.40 lei 43-57 zile |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1043.63 lei
- 20% Preț: 334.61 lei
- 20% Preț: 336.22 lei
- 20% Preț: 445.69 lei
- 20% Preț: 238.01 lei
- 20% Preț: 334.61 lei
- 20% Preț: 438.69 lei
- Preț: 442.03 lei
- 20% Preț: 337.87 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 634.41 lei
- 17% Preț: 427.22 lei
- 20% Preț: 643.99 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1057.10 lei
- 20% Preț: 581.55 lei
- Preț: 374.84 lei
- 20% Preț: 331.36 lei
- 15% Preț: 431.22 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1390.89 lei
- 20% Preț: 1007.16 lei
- 20% Preț: 569.54 lei
- 20% Preț: 575.48 lei
- 20% Preț: 573.59 lei
- 20% Preț: 750.35 lei
- 15% Preț: 570.71 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 347.59 lei
- 20% Preț: 576.02 lei
- Preț: 404.00 lei
- 20% Preț: 586.43 lei
- 20% Preț: 750.35 lei
- 20% Preț: 812.01 lei
- 20% Preț: 649.49 lei
- 20% Preț: 344.34 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 471.49 lei
Preț vechi: 554.69 lei
-15% Nou
Puncte Express: 707
Preț estimativ în valută:
90.26€ • 92.83$ • 74.88£
90.26€ • 92.83$ • 74.88£
Carte tipărită la comandă
Livrare economică 17 februarie-03 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789819750276
ISBN-10: 981975027X
Pagini: 443
Ilustrații: XIII, 456 p. 95 illus., 58 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.65 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
ISBN-10: 981975027X
Pagini: 443
Ilustrații: XIII, 456 p. 95 illus., 58 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.65 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
Cuprins
Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.