Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings: Lecture Notes in Computer Science, cartea 13099
Editat de Mauro Conti, Marc Stevens, Stephan Krennen Limba Engleză Paperback – 9 dec 2021
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei - 20%
Preț: 568.70 lei - 20%
Preț: 573.45 lei - 20%
Preț: 984.64 lei - 20%
Preț: 400.77 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 487.46 lei - 20%
Preț: 324.19 lei - 20%
Preț: 631.96 lei - 20%
Preț: 489.11 lei - 20%
Preț: 556.96 lei - 20%
Preț: 560.93 lei - 15%
Preț: 558.12 lei - 20%
Preț: 679.09 lei - 20%
Preț: 327.36 lei - 20%
Preț: 793.92 lei - 20%
Preț: 315.62 lei - 20%
Preț: 434.17 lei - 20%
Preț: 342.61 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 432.78 lei - 20%
Preț: 400.17 lei - 20%
Preț: 373.80 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 620.33 lei - 20%
Preț: 731.97 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 403.00 lei - 20%
Preț: 328.94 lei - 20%
Preț: 563.29 lei - 20%
Preț: 330.54 lei - 20%
Preț: 336.86 lei -
Preț: 395.25 lei - 20%
Preț: 733.68 lei - 20%
Preț: 355.27 lei - 20%
Preț: 850.42 lei - 20%
Preț: 558.53 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 375.72 lei - 20%
Preț: 629.71 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 628.56 lei
Preț vechi: 739.48 lei
-15%
Puncte Express: 943
Preț estimativ în valută:
111.16€ • 130.44$ • 96.41£
111.16€ • 130.44$ • 96.41£
Carte tipărită la comandă
Livrare economică 09-23 martie
Specificații
ISBN-13: 9783030925475
ISBN-10: 3030925471
Pagini: 554
Ilustrații: XIII, 554 p. 56 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.79 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030925471
Pagini: 554
Ilustrații: XIII, 554 p. 56 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.79 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Encryption.- Cross-Domain Attribute-Based Access Control Encryption.- Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.- Partition Oracles from Weak Key Forgeries.- Practical Privacy-Preserving Face Identification based on FunctionHiding Functional Encryption.- The Matrix Reloaded: Multiplication Strategies in FrodoKEM.- Signatures.- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from OR-Proofs.- Effcient Threshold-Optimal ECDSA.- GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme.- Issuer-Hiding Attribute-Based Credentials.- Report and Trace Ring Signatures.- Selectively Linkable Group Signatures — Stronger Security and Preserved Verifiability.- Cryptographic Schemes and Protocols.- FO-like Combiners and Hybrid Post-Quantum Cryptography.- Linear-time oblivious permutations for SPDZ.- On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem.- Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model.- Attacks and Counter-Measures.- Countermeasures against Backdoor Attacks towards Malware Detectors.- Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services.- Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions.- How Distance-bounding can Detect Internet Traffc Hijacking.- SoK: Secure Memory Allocation.- Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.- Towards Quantum Large-Scale Password Guessing on Real-World Distributions.- Attestation and Verification.- Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.- Attestation Waves: Platform Trust via Remote Power Analysis.- How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting.- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs.- THC: Practical and Cost-Effective Verification of Delegated Computation.- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model.