Cantitate/Preț
Produs

Innovative Security Solutions for Information Technology and Communications: 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers: Lecture Notes in Computer Science, cartea 10543

Editat de Pooya Farshim, Emil Simion
en Limba Engleză Paperback – 29 oct 2017
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 31906 lei

Preț vechi: 39883 lei
-20% Nou

Puncte Express: 479

Preț estimativ în valută:
6106 6422$ 5086£

Carte tipărită la comandă

Livrare economică 04-18 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319692838
ISBN-10: 3319692836
Pagini: 201
Ilustrații: XII, 201 p. 35 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.31 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Faster Zero-Knowledge Protocols and Applications.- Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.- Key-policy Attribute-based Encryption from Bilinear Maps.- Security of Pseudo-Random Number Generators with Input.- Securing the Foundations of Democracy.- Exploring Naccache-Stern Knapsack Encryption.- Proximity Assurances Based on Natural and Artificial Ambient Environments.- Challenges of Federating National Data Access Infrastructures.- Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.- Evolution of the McEliece Public Key Encryption Scheme.- New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.- Secretly Embedding Trapdoors into Contract Signing Protocols.- On A Key Exchange Protocol. 

Caracteristici

Includes supplementary material: sn.pub/extras