Computer Security – ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II: Lecture Notes in Computer Science, cartea 11736
Editat de Kazue Sako, Steve Schneider, Peter Y. A. Ryanen Limba Engleză Paperback – 27 aug 2019
The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:
Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.
Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 336.73 lei 6-8 săpt. | |
| Springer International Publishing – 27 aug 2019 | 336.73 lei 6-8 săpt. | |
| Springer International Publishing – 27 aug 2019 | 345.42 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 336.73 lei
Preț vechi: 420.91 lei
-20%
Puncte Express: 505
Preț estimativ în valută:
59.55€ • 70.61$ • 51.85£
59.55€ • 70.61$ • 51.85£
Carte tipărită la comandă
Livrare economică 31 martie-14 aprilie
Specificații
ISBN-13: 9783030299613
ISBN-10: 3030299619
Pagini: 627
Ilustrații: XXVI, 627 p. 803 illus., 71 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030299619
Pagini: 627
Ilustrații: XXVI, 627 p. 803 illus., 71 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Software Security.- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs.- Uncovering Information Flow Policy Violations in C Programs.- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.- Static Detection of Uninitialized Stack Variables in Binary Code.- Towards Automated Application-Specific Software Stacks.- Cryptographic Protocols.- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices.- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.- Feistel Structures for MPC, and More.- Arithmetic Garbling from Bilinear Maps.- Security Models.- SEPD: An Access Control Model for Resource Sharing in an IoT Environment.- Nighthawk: Transparent System Introspection from Ring -3.- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.- Searchable Encryption.- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.- Generic Multi-keyword Ranked Search on Encrypted Cloud Data.- An Efficiently Searchable Encrypted Data Structure for Range Queries.- Privacy.- GDPiRated - Stealing Personal Information On- and Offline.- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.- OCRAM-assisted Sensitive Data Protection on ARM-based Platform.- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping.- Key Exchange Protocols.- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography.- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.- Web Security.- The Risks of WebGL: Analysis, Evaluation and Detection.- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.- Fingerprint Surface-Based Detection of Web Bot Detectors.- Testing for Integrity Flaws in Web Sessions.