Computer Security - ESORICS 2019: Lecture Notes in Computer Science, cartea 11736
Editat de Kazue Sako, Steve Schneider, Peter Y. A. Ryanen Limba Engleză Paperback – 27 aug 2019
The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:
Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.
Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 340.38 lei 6-8 săpt. | |
| Springer – 27 aug 2019 | 340.38 lei 6-8 săpt. | |
| Springer – 27 aug 2019 | 349.81 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 340.38 lei
Preț vechi: 425.47 lei
-20%
Puncte Express: 511
Preț estimativ în valută:
60.15€ • 69.43$ • 52.46£
60.15€ • 69.43$ • 52.46£
Carte tipărită la comandă
Livrare economică 18 mai-01 iunie
Specificații
ISBN-13: 9783030299613
ISBN-10: 3030299619
Pagini: 656
Ilustrații: XXVI, 627 p. 803 illus., 71 illus. in color.
Dimensiuni: 155 x 235 x 36 mm
Greutate: 0.98 kg
Ediția:1st ed. 2019
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030299619
Pagini: 656
Ilustrații: XXVI, 627 p. 803 illus., 71 illus. in color.
Dimensiuni: 155 x 235 x 36 mm
Greutate: 0.98 kg
Ediția:1st ed. 2019
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Software Security.- Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs.- Uncovering Information Flow Policy Violations in C Programs.- BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.- Static Detection of Uninitialized Stack Variables in Binary Code.- Towards Automated Application-Specific Software Stacks.- Cryptographic Protocols.- Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices.- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.- Feistel Structures for MPC, and More.- Arithmetic Garbling from Bilinear Maps.- Security Models.- SEPD: An Access Control Model for Resource Sharing in an IoT Environment.- Nighthawk: Transparent System Introspection from Ring -3.- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.- Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.- Searchable Encryption.- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.- Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.- Generic Multi-keyword Ranked Search on Encrypted Cloud Data.- An Efficiently Searchable Encrypted Data Structure for Range Queries.- Privacy.- GDPiRated - Stealing Personal Information On- and Offline.- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation.- OCRAM-assisted Sensitive Data Protection on ARM-based Platform.- Privacy-Preserving Collaborative Medical Time Series Analysis based on Dynamic Time Warping.- Key Exchange Protocols.- IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key Cryptography.- Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.- Web Security.- The Risks of WebGL: Analysis, Evaluation and Detection.- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.- Fingerprint Surface-Based Detection of Web Bot Detectors.- Testing for Integrity Flaws in Web Sessions.