Security and Privacy: Select Proceedings of ICSP 2020: Lecture Notes in Electrical Engineering, cartea 744
Editat de Pantelimon Stănică, Sugata Gangopadhyay, Sumit Kumar Debnathen Limba Engleză Paperback – 4 apr 2022
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 627.42 lei 6-8 săpt. | |
Springer Nature Singapore – 4 apr 2022 | 627.42 lei 6-8 săpt. | |
Hardback (1) | 633.55 lei 6-8 săpt. | |
Springer Nature Singapore – 3 apr 2021 | 633.55 lei 6-8 săpt. |
Din seria Lecture Notes in Electrical Engineering
- 18% Preț: 1821.29 lei
- 18% Preț: 877.13 lei
- 18% Preț: 1530.46 lei
- 20% Preț: 1443.48 lei
- 18% Preț: 5064.45 lei
- 20% Preț: 1706.12 lei
- 20% Preț: 1879.08 lei
- 18% Preț: 1541.26 lei
- 18% Preț: 1814.16 lei
- 18% Preț: 1546.68 lei
- 18% Preț: 1864.42 lei
- 18% Preț: 2070.09 lei
- 18% Preț: 874.34 lei
- 18% Preț: 1375.79 lei
- 18% Preț: 1110.63 lei
- 18% Preț: 1810.31 lei
- 18% Preț: 1356.47 lei
- 20% Preț: 1273.77 lei
- 20% Preț: 1150.95 lei
- 20% Preț: 1283.46 lei
- 18% Preț: 2494.54 lei
- 20% Preț: 1283.46 lei
- 18% Preț: 1642.53 lei
- 20% Preț: 1158.21 lei
- 18% Preț: 1364.21 lei
- 18% Preț: 1096.69 lei
- 18% Preț: 1644.10 lei
- 18% Preț: 1564.44 lei
- 18% Preț: 1369.64 lei
- 20% Preț: 1416.01 lei
- 18% Preț: 1219.64 lei
- 20% Preț: 1149.31 lei
- 18% Preț: 794.40 lei
- 20% Preț: 1150.13 lei
- 20% Preț: 1452.39 lei
- 20% Preț: 1876.67 lei
- 18% Preț: 1359.57 lei
- 18% Preț: 1396.70 lei
- 20% Preț: 1271.33 lei
- 18% Preț: 1378.91 lei
- 18% Preț: 1634.04 lei
- 18% Preț: 1371.95 lei
- 18% Preț: 1094.38 lei
- 18% Preț: 1541.26 lei
- 18% Preț: 1377.36 lei
- 18% Preț: 711.68 lei
- 18% Preț: 1377.36 lei
- 18% Preț: 1213.43 lei
- 18% Preț: 710.92 lei
Preț: 627.42 lei
Preț vechi: 784.27 lei
-20% Nou
Puncte Express: 941
Preț estimativ în valută:
120.06€ • 126.31$ • 99.41£
120.06€ • 126.31$ • 99.41£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789813367838
ISBN-10: 9813367830
Ilustrații: XIV, 176 p. 41 illus., 24 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.28 kg
Ediția:1st ed. 2021
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Electrical Engineering
Locul publicării:Singapore, Singapore
ISBN-10: 9813367830
Ilustrații: XIV, 176 p. 41 illus., 24 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.28 kg
Ediția:1st ed. 2021
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Electrical Engineering
Locul publicării:Singapore, Singapore
Cuprins
A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates.- Combining Human Ear and Profile Face Biometrics for Identity Recognition.- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA.- Efficient Random Grid Visual Cryptographic Schemes having Essential Members.- Further results on bent-negabent Boolean functions.- Generalization of Lattice Based Cryptography on Hypercomplex Algebras.- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model.- Image Security using Hyperchaos and Multidimensional Playfair Cipher.- Iris recognition using improved Xor-Sum Code.- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$.- Low c-differential uniformity for the Gold function modified on a subfield.- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography.- Provably insecure group authentication Not all security proofs arewhat they claim to be.- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.
Notă biografică
Pantelimon Stanica is currently working as a Professor in the Department of Applied Mathematics, Graduate School of Engineering & Applied Sciences (GSEAS) at Naval Postgraduate School, Monterey, USA. He is also associated with the Institute of Mathematics of Romanian Academy as a researcher. He received his doctoral degree in mathematics from the State University of New York at Buffalo in 1998. He also received a doctorate in algebra from the Institute of Mathematics of the Romanian Academy in 1998. He has published over 150 research articles in internationally reputed journals and conferences and has co-authored a book on Cryptographic Boolean Functions (now in the second edition) and co-edited two conference proceedings. His research interests include number theory, cryptography, coding theory, combinatorics, finite fields, Boolean functions, valuation theory, class field theory, and theoretical computer science.
Sugata Gangopadhyay is currently working as a Professor in theDepartment of Computer Science, Indian Institute of Technology Roorkee, India. He received his doctoral degree in mathematics from the Indian Institute of Technology Kharagpur, India, in 1998. He received an Outstanding Teacher Award in 2016 from IIT Roorkee and ONR-Global VSP award to visit Naval Postgraduate School, Monterey, California USA. He served in the program committee of NSUCRYPTO the International Students' Olympiad in Cryptography organized by Novosibirsk State University, Russia. He has published several research articles in internationally reputed journals and conferences. His research interests include cryptology, cryptographic Boolean functions, and stream cipher cryptanalysis.
Sumit Kumar Debnath is an Assistant Professor in the Department of Mathematics, National Institute of Technology Jamshedpur, India. He received his doctoral degree in cryptology & network security from the Indian Institute of Technology Kharagpur, India, in 2017. He has published several research articles in internationally reputed journals and conferences. He is a life member of the Cryptology Research Society of India (CRSI). His research interests include multivariate cryptography, lattice-based cryptography, isogeny-based cryptography, quantum cryptography, secure two-party/multi-party computation, secure set intersection, electronic voting, functional encryption, identity-based cryptography, and oblivious transfer.
Sugata Gangopadhyay is currently working as a Professor in theDepartment of Computer Science, Indian Institute of Technology Roorkee, India. He received his doctoral degree in mathematics from the Indian Institute of Technology Kharagpur, India, in 1998. He received an Outstanding Teacher Award in 2016 from IIT Roorkee and ONR-Global VSP award to visit Naval Postgraduate School, Monterey, California USA. He served in the program committee of NSUCRYPTO the International Students' Olympiad in Cryptography organized by Novosibirsk State University, Russia. He has published several research articles in internationally reputed journals and conferences. His research interests include cryptology, cryptographic Boolean functions, and stream cipher cryptanalysis.
Sumit Kumar Debnath is an Assistant Professor in the Department of Mathematics, National Institute of Technology Jamshedpur, India. He received his doctoral degree in cryptology & network security from the Indian Institute of Technology Kharagpur, India, in 2017. He has published several research articles in internationally reputed journals and conferences. He is a life member of the Cryptology Research Society of India (CRSI). His research interests include multivariate cryptography, lattice-based cryptography, isogeny-based cryptography, quantum cryptography, secure two-party/multi-party computation, secure set intersection, electronic voting, functional encryption, identity-based cryptography, and oblivious transfer.
Textul de pe ultima copertă
This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
Caracteristici
Contains research outcomes of world-famous researchers working in the field of the security and privacy Develops a basic understanding of the techniques used to protect users online and addresses some of the design choices behind these techniques Provides several future directions of research in the context of science and engineering