Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II: Lecture Notes in Computer Science, cartea 12309
Editat de Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneideren Limba Engleză Paperback – 13 sep 2020
The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 343.05 lei 6-8 săpt. | |
| Springer International Publishing – 12 sep 2020 | 343.05 lei 6-8 săpt. | |
| Springer International Publishing – 13 sep 2020 | 343.05 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 461.83 lei - 20%
Preț: 461.57 lei - 20%
Preț: 424.26 lei - 20%
Preț: 390.69 lei - 20%
Preț: 498.50 lei - 15%
Preț: 388.50 lei - 20%
Preț: 390.35 lei - 20%
Preț: 460.98 lei - 20%
Preț: 461.52 lei - 20%
Preț: 497.55 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.83 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 391.14 lei - 20%
Preț: 389.85 lei - 20%
Preț: 461.32 lei - 20%
Preț: 498.32 lei - 20%
Preț: 496.64 lei - 20%
Preț: 532.28 lei - 20%
Preț: 527.36 lei - 20%
Preț: 498.46 lei - 15%
Preț: 461.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 532.41 lei - 20%
Preț: 462.24 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 252.15 lei - 20%
Preț: 390.94 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.86 lei - 20%
Preț: 532.54 lei - 20%
Preț: 462.67 lei - 20%
Preț: 461.65 lei - 20%
Preț: 639.72 lei - 20%
Preț: 255.91 lei - 15%
Preț: 535.92 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 499.36 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.20 lei - 20%
Preț: 249.95 lei
Preț: 343.05 lei
Preț vechi: 428.80 lei
-20% Nou
Puncte Express: 515
Preț estimativ în valută:
60.71€ • 71.20$ • 53.23£
60.71€ • 71.20$ • 53.23£
Carte tipărită la comandă
Livrare economică 26 ianuarie-09 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030590123
ISBN-10: 3030590127
Pagini: 722
Ilustrații: XXVIII, 760 p. 391 illus., 81 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030590127
Pagini: 722
Ilustrații: XXVIII, 760 p. 391 illus., 81 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.08 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Formal Modelling.- Automatic generation of source lemmas in Tamarin: towards automatic proofs of security protocols.- When is a test not a proof.- Hardware Fingerprinting for the ARINC 429 Avionic Bus.- Applied Cryptography.- Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-based Definition.- SHECS-PIR: Somewhat Homomorphic Encryption-based Compact and Scalable Private Information Retrieval.- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.- Analyzing Attacks.- Linear Attack on Round-Reduced DES Using Deep Learning.- Detection by Attack: Detecting Adversarial Samples by Undercover Attack.- Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.- Active Re-identification Attacks on Periodically Released Dynamic Social Graphs.- System Security.- Fooling primality tests on smartcards.- An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA.- On the Privacy Risks of Compromised Trigger-Action Platforms.- Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces.- Post-Quantum Cryptography.- Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication.- CSH: A Post-quantum Secret Handshake Scheme from Coding Theory.- A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing.- A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.- Post-Quantum Adaptor Signatures and Payment Channel Networks.- Security Analysis.- Linear-Complexity Private Function Evaluation is Practical.- Certifying Decision Trees Against Evasion Attacks by Program Analysis.- They Might NOT Be Giants: Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization.- Understanding Object Detection Through An Adversarial Lens.- Applied Cryptography.- Signatures with Tight Multi-User Security from Search Assumptions.- Biased RSA private keys: Origin attribution of GCD-factorable keys.- MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation.- Evaluating the e ectiveness of heuristic worst-case noise analysis in FHE.- Blockchain.- How to Model the Bribery Attack: A Practical Quanti cation Method in Blockchain.- Updatable Blockchains.- PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Off-chain Contract Execution.- Applied Cryptography.- Identity-Based Authenticated Encryption with Identity Confidentiality.- Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.- On Private Information Retrieval Supporting Range Queries.- Blockchain.- 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.- Generic Superlight Client for Permissionless Blockchains.- LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit.