Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11125
Editat de Chunhua Su, Hiroaki Kikuchien Limba Engleză Paperback – 6 sep 2018
The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 381.21 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 15% Preț: 438.59 lei
- 20% Preț: 591.51 lei
- 20% Preț: 649.49 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 349.40 lei
Preț vechi: 436.75 lei
-20% Nou
Puncte Express: 524
Preț estimativ în valută:
66.86€ • 69.38$ • 55.89£
66.86€ • 69.38$ • 55.89£
Carte tipărită la comandă
Livrare economică 17-31 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319998060
ISBN-10: 3319998064
Pagini: 900
Ilustrații: XIV, 624 p. 111 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319998064
Pagini: 900
Ilustrații: XIV, 624 p. 111 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
System Security.- Macros Finder: Do You Remember LOVELETTER.- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification.- Compact Ring Signature in the Standard Model for Blockchain.- Public key cryptography.- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE.- An Almost Non-Interactive Order Preserving Encryption Scheme.- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.- Searchable and functional encryption.- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.- Constrained (Verifiable) Pseudorandom Function from Functional Encryption.- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper).- (Post-quantum) Signature schemes.- Certificateless Public Key Signature Schemes from Standard Algorithms.- A New Design of Online/Offline Signatures Based on Lattice.- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation.- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures.- Security Protocols.- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes.- Keyword-Based Delegable Proofs of Storage.- A Generic Framework for Accountable Optimistic Fair Exchange Protocol.- Network Security.- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification.- A Two-Stage Classifier Approach for Network Intrusion Detection.- DSH: Deniable Secret Handshake Framework.- Authentication.- Non-adaptive Group-Testing Aggregate MAC Scheme.- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones.- Seeing is believing: authenticating users with what they see and remember.- Side-channel Attacks.- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks.- Recovering Memory Access Sequence with Differential Flush+Reload Attack.- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE.- Security for Cyber-Physical Systems.- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper).- Regulating IoT messages.- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks.- Security in Mobile Environment.- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.- Privacy-preserving data collection for mobile phone sensing tasks.- Secure Computation and Data Privacy.- M-ORAM Revisited: Security and Construction Updates.- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM.- (k,l)-clustering for Transactional Data Streams Anonymization.- Cryptographic Protocols.- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion.- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness.- An Efficient and Provably Secure Private Polynomial Evaluation Scheme.- Efficient Traceable Oblivious Transfer and Its Applications.