Cyberspace Safety and Security: Lecture Notes in Computer Science, cartea 13547
Editat de Xiaofeng Chen, Jian Shen, Willy Susiloen Limba Engleză Paperback – 29 sep 2022
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 326.88 lei
Preț vechi: 408.60 lei
-20%
Puncte Express: 490
Carte tipărită la comandă
Livrare economică 03-17 iunie
Specificații
ISBN-13: 9783031180668
ISBN-10: 3031180666
Pagini: 392
Ilustrații: XIII, 376 p. 97 illus., 65 illus. in color.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Ediția:1st edition 2022
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031180666
Pagini: 392
Ilustrații: XIII, 376 p. 97 illus., 65 illus. in color.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Ediția:1st edition 2022
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Cryptography and its applications.- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead.- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare.- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) .- A Collaborative Access Control Scheme based on Incentive Mechanism.- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing.- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage.- Data security.- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers.- A Method of Traceless File Deletion for NTFS File System.- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting.- Attack and defense techniques.- High Quality Audio Adversarial Examples without Using Psychoacoustics.- Working Mechanism of Eternalblue and Its Application in Ransomworm.- Substitution Attacks against Sigma Protocols.- A Multi-stage APT Attack Detection Method based on Sample Enhancement.- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer.- Network security and its applications.- Improvised Model for Blockchain in Distributed Cloud Environment.- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model.- Design of Anti-machine Learning Malicious Node System based on Blockchain.