Cantitate/Preț
Produs

Applied Cryptography and Network Security: Lecture Notes in Computer Science, cartea 12726

Editat de Kazue Sako, Nils Ole Tippenhauer
en Limba Engleză Paperback – 9 iun 2021
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows:
Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography;
Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32476 lei  22-36 zile
  Springer – 9 iun 2021 32476 lei  22-36 zile
  Springer – 10 iun 2021 52584 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 32476 lei

Preț vechi: 40596 lei
-20%

Puncte Express: 487

Preț estimativ în valută:
5743 6585$ 4963£

Carte indisponibilă temporar


Specificații

ISBN-13: 9783030783716
ISBN-10: 3030783715
Pagini: 496
Ilustrații: XIV, 482 p. 72 illus., 21 illus. in color.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.74 kg
Ediția:1st edition 2021
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Cryptographic Protocols.- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles.- Analysis of Client-side Security for Long-term Time-stamping Services.- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.- Secure and Fair Protocols.- CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning.- Blind Polynomial Evaluation and Data Trading.- Coin-Based Multi-Party Fair Exchange.- Cryptocurrency and Smart Contracts.- P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange.- WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets.- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.- Digital Signatures.- Unlinkable and Invisible -Sanitizable Signatures.- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More.- An Efficient Certificate-Based Signature Scheme in the Standard Model.- Embedded System Security.- SnakeGX: a sneaky attack against SGX Enclaves.- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks.- Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems.- Lattice Cryptography.- Access Control Encryption from Group Encryption.- Password Protected Secret Sharing from Lattices.- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts.