Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6123
Editat de Jianying Zhou, Moti Yungen Limba Engleză Paperback – 9 iun 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.42 lei - 20%
Preț: 326.81 lei - 20%
Preț: 391.36 lei - 20%
Preț: 321.68 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 320.72 lei - 20%
Preț: 497.25 lei - 15%
Preț: 496.40 lei - 20%
Preț: 324.19 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 458.84 lei - 20%
Preț: 390.42 lei - 20%
Preț: 270.68 lei - 20%
Preț: 497.75 lei - 20%
Preț: 423.78 lei - 20%
Preț: 322.32 lei - 20%
Preț: 322.09 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 463.03 lei
Preț: 552.66 lei
Preț vechi: 690.82 lei
-20% Nou
Puncte Express: 829
Preț estimativ în valută:
97.78€ • 114.09$ • 85.49£
97.78€ • 114.09$ • 85.49£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642137075
ISBN-10: 3642137075
Pagini: 577
Ilustrații: XIII, 564 p. 83 illus.
Greutate: 1.02 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642137075
Pagini: 577
Ilustrații: XIII, 564 p. 83 illus.
Greutate: 1.02 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public Key Encryption.- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.- How to Construct Interval Encryption from Binary Tree Encryption.- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.- Digital Signature.- Trapdoor Sanitizable Signatures Made Easy.- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.- Redactable Signatures for Tree-Structured Data: Definitions and Constructions.- Block Ciphers and Hash Functions.- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions.- Multi-trail Statistical Saturation Attacks.- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G???.- High Performance GHASH Function for Long Messages.- Side-Channel Attacks.- Principles on the Security of AES against First and Second-Order Differential Power Analysis.- Adaptive Chosen-Message Side-Channel Attacks.- Secure Multiplicative Masking of Power Functions.- Zero Knowledge and Multi-party Protocols.- Batch Groth–Sahai.- Efficient and Secure Evaluation of Multivariate Polynomials and Applications.- Efficient Implementation of the Orlandi Protocol.- Improving the Round Complexity of Traitor Tracing Schemes.- Key Management.- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.- Deniable Internet Key Exchange.- Authentication and Identification.- A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm.- Secure Sketch for Multiple Secrets.- A Message Recognition Protocol Based on Standard Assumptions.- Privacy and Anonymity.- Affiliation-Hiding Key Exchange with Untrusted Group Authorities.- Privacy-Preserving Group Discovery with Linear Complexity.- Two New Efficient PIR-Writing Protocols.- Regulatory Compliant Oblivious RAM.- RFID Security and Privacy.- Revisiting Unpredictability-Based RFID Privacy Models.- OnRFID Privacy with Mutual Authentication and Tag Corruption.- Internet Security.- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.- COP: A Step toward Children Online Privacy.- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.