Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings: Lecture Notes in Computer Science, cartea 10662
Editat de Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarthen Limba Engleză Paperback – 22 noi 2017
The 13 revised full papers presented together with 1 short paper, 7 invited talks, and 4 tutorials were carefully reviewed and selected from 49 initial submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
Din seria Lecture Notes in Computer Science
- 20% Preț: 571.63 lei
- 20% Preț: 336.71 lei
- 20% Preț: 333.46 lei
- 20% Preț: 662.76 lei
- 20% Preț: 330.23 lei
- 20% Preț: 747.79 lei
- 20% Preț: 438.67 lei
- 20% Preț: 369.12 lei
- 20% Preț: 315.76 lei
- 20% Preț: 584.40 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 315.18 lei
- 20% Preț: 256.26 lei
- 20% Preț: 1040.03 lei
- 20% Preț: 504.56 lei
- Preț: 402.62 lei
- 20% Preț: 346.40 lei
- 20% Preț: 301.94 lei
- 20% Preț: 237.99 lei
- 5% Preț: 365.59 lei
- 20% Preț: 309.89 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.25 lei
- 20% Preț: 334.68 lei
- Preț: 373.56 lei
- 20% Preț: 172.68 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 315.76 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 444.17 lei
- 20% Preț: 567.60 lei
- 20% Preț: 632.22 lei
- 17% Preț: 360.18 lei
- 20% Preț: 538.28 lei
- 20% Preț: 335.08 lei
- 20% Preț: 307.68 lei
- 20% Preț: 343.16 lei
- 20% Preț: 641.78 lei
- 20% Preț: 579.56 lei
- 20% Preț: 1053.45 lei
- 15% Preț: 568.74 lei
- Preț: 389.47 lei
- 20% Preț: 333.46 lei
- 20% Preț: 607.38 lei
- 20% Preț: 326.97 lei
Preț: 326.84 lei
Preț vechi: 408.56 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
62.54€ • 65.80$ • 51.78£
62.54€ • 65.80$ • 51.78£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319715001
ISBN-10: 3319715003
Pagini: 295
Ilustrații: XXIV, 295 p. 55 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.45 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319715003
Pagini: 295
Ilustrații: XXIV, 295 p. 55 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.45 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
On the (in)Security of ChaCha20 Against Physical Attacks.- An Industrial Outlook on Challenges of Hardware Security in Digital Economy.- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon.- Cache Attacks: From Cloud to Mobile.- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions.- Parameter Choices for LWE.- Efficient Side Channel Testing of Cryptographic Devices Using TVLA.- IoT Insecurity - Innovation and Incentives in Industry.- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust.- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers.- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era.- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves.- Analysis of Diagonal Constants in Salsa.- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults.- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices.- Similarity Based Interactive Private Information Retrieval.- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA).- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs.- Mutual Friend Attack Prevention in Social Network Data Publishing.- Short Integrated PKE+PEKS in Standard Model.- Differential Fault Attack on Grain v1, ACORN v3 and Lizard.- Certain observations on ACORN v3 and the Implications to TMDTO Attacks.- Efficient Implementation of Private License Plate Matching Protocols.
Caracteristici
Includes supplementary material: sn.pub/extras