Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers: Lecture Notes in Computer Science, cartea 11286
Editat de Vashek Matyáš, Petr Švenda, Frank Stajano, Bruce Christianson, Jonathan Andersonen Limba Engleză Paperback – 24 noi 2018
The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.
Din seria Lecture Notes in Computer Science
- 15% Preț: 549.48 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.78 lei
- 20% Preț: 238.01 lei
- 20% Preț: 1017.66 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 548.35 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 315.19 lei
- 20% Preț: 1005.39 lei
- 20% Preț: 554.59 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 560.32 lei
- 20% Preț: 611.22 lei
- 20% Preț: 319.10 lei
- 20% Preț: 552.64 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.78 lei
- Preț: 361.23 lei
- 20% Preț: 969.58 lei
- 20% Preț: 256.27 lei
- 20% Preț: 782.28 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 722.90 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.72 lei
- 20% Preț: 550.29 lei
- Preț: 389.06 lei
- 20% Preț: 564.99 lei
- 20% Preț: 552.25 lei
- 20% Preț: 552.25 lei
- 20% Preț: 722.40 lei
- 20% Preț: 331.59 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 316.04 lei
Preț vechi: 395.05 lei
-20% Nou
Puncte Express: 474
Preț estimativ în valută:
60.50€ • 65.91$ • 50.75£
60.50€ • 65.91$ • 50.75£
Carte tipărită la comandă
Livrare economică 18 decembrie 24 - 01 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030032500
ISBN-10: 3030032507
Pagini: 320
Ilustrații: XI, 305 p. 30 illus., 19 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.45 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030032507
Pagini: 320
Ilustrații: XI, 305 p. 30 illus., 19 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.45 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Raven Authentication Service - Attacks and Countermeasures.- Raven Authentication Service - Attacks and Countermeasures (Transcript of Discussion).- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations.- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion).- Non-Monotonic Security Protocols and Failures in Financial Intermediation.- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion).- HoneyPAKEs.- HoneyPAKEs (Transcript of Discussion).- Entropy crowdsourcing - protocols for link key updates in wireless sensor Networks.- Entropy crowdsourcing - protocols for link key updates in wireless sensor networks (Transcript of Discussion).- Daemones non Operantur Nisi per Artem.- Daemones non Operantur Nisi per Artem (Transcript of Discussion).- Intentionality and agency in security.- Intentionality and agency in security (Transcript of Discussion).- Incentives in Security Protocols.- Incentives in Security Protocols (Transcript of Discussion).- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System.- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).- How does match-fixing inform computer game security.- How does match-fixing inform computer game security? (Transcript of Discussion).- From Secure Messaging to Secure Collaboration.- From Secure Messaging to Secure Collaboration (Transcript of Discussion).- Requirements for Root of Trust Establishment.- Requirements for Root of Trust Establishment (Transcript of Discussion).- User Authentication for the Internet of Things.- User Authentication for the Internet of Things (Transcript of Discussion).- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough.- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion).- Making Bitcoin Legal.- Making Bitcoin Legal (Transcript of Discussion).- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do.- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion).- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).