Computer Security – ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II: Lecture Notes in Computer Science, cartea 11736
Editat de Kazue Sako, Steve Schneider, Peter Y. A. Ryanen Limba Engleză Paperback – 27 aug 2019
The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:
Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.
Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 336.73 lei 6-8 săpt. | |
| Springer International Publishing – 27 aug 2019 | 336.73 lei 6-8 săpt. | |
| Springer International Publishing – 27 aug 2019 | 345.42 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 336.73 lei
Preț vechi: 420.91 lei
-20% Nou
Puncte Express: 505
Preț estimativ în valută:
59.59€ • 69.87$ • 52.33£
59.59€ • 69.87$ • 52.33£
Carte tipărită la comandă
Livrare economică 04-18 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030299613
ISBN-10: 3030299619
Pagini: 627
Ilustrații: XXVI, 627 p. 803 illus., 71 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030299619
Pagini: 627
Ilustrații: XXVI, 627 p. 803 illus., 71 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Software Security.- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs.- Uncovering Information Flow Policy Violations in C Programs.- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.- Static Detection of Uninitialized Stack Variables in Binary Code.- Towards Automated Application-Specific Software Stacks.- Cryptographic Protocols.- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices.- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.- Feistel Structures for MPC, and More.- Arithmetic Garbling from Bilinear Maps.- Security Models.- SEPD: An Access Control Model for Resource Sharing in an IoT Environment.- Nighthawk: Transparent System Introspection from Ring -3.- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.- Searchable Encryption.- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.- Generic Multi-keyword Ranked Search on Encrypted Cloud Data.- An Efficiently Searchable Encrypted Data Structure for Range Queries.- Privacy.- GDPiRated - Stealing Personal Information On- and Offline.- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.- OCRAM-assisted Sensitive Data Protection on ARM-based Platform.- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping.- Key Exchange Protocols.- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography.- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.- Web Security.- The Risks of WebGL: Analysis, Evaluation and Detection.- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.- Fingerprint Surface-Based Detection of Web Bot Detectors.- Testing for Integrity Flaws in Web Sessions.