Cantitate/Preț
Produs

Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings: Lecture Notes in Computer Science, cartea 12586

Editat de Lejla Batina, Stjepan Picek, Mainack Mondal
en Limba Engleză Paperback – 22 dec 2020
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual.
The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 32571 lei  6-8 săpt.
  Springer International Publishing – 22 dec 2020 32571 lei  6-8 săpt.
  Springer International Publishing – 29 ian 2022 40979 lei  6-8 săpt.
  Springer Nature Switzerland – 7 dec 2022 49764 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 32571 lei

Preț vechi: 40714 lei
-20% Nou

Puncte Express: 489

Preț estimativ în valută:
6235 6481$ 5170£

Carte tipărită la comandă

Livrare economică 07-21 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030666255
ISBN-10: 3030666255
Pagini: 259
Ilustrații: X, 259 p. 87 illus., 37 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.39 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

tPAKE: Typo-Tolerant Password-Authenticated Key Exchange.- PAS-TA-U: PASsword-based Threshold Authentication with Password Update.- Re-Markable: Stealing Watermarked Neural Networks through Synthesis.- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning.- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics.- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT.- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT.- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures.- An Insecurity Study of Ethereum Smart Contracts.- Cryptographically Secure Multi-Tenant Provisioning of FPGAs.- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes.- Quantum Resource Estimates of Grover’sKey Search on ARIA.