Information Security and Cryptology: Security and Cryptology
Editat de Dongdai Lin, Moti Yung, Jianying Zhouen Limba Engleză Paperback – 8 apr 2015
Din seria Security and Cryptology
- 20%
Preț: 327.36 lei - 20%
Preț: 325.30 lei - 20%
Preț: 330.54 lei - 20%
Preț: 524.32 lei - 20%
Preț: 329.74 lei - 20%
Preț: 495.22 lei - 15%
Preț: 499.72 lei -
Preț: 383.23 lei -
Preț: 376.75 lei - 20%
Preț: 323.41 lei -
Preț: 385.06 lei - 15%
Preț: 672.87 lei - 20%
Preț: 317.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 317.85 lei - 20%
Preț: 497.84 lei - 20%
Preț: 327.36 lei - 20%
Preț: 321.03 lei - 15%
Preț: 497.51 lei -
Preț: 379.15 lei -
Preț: 374.34 lei - 20%
Preț: 326.55 lei - 20%
Preț: 321.81 lei -
Preț: 368.43 lei - 20%
Preț: 319.42 lei -
Preț: 372.15 lei - 20%
Preț: 321.81 lei -
Preț: 380.46 lei - 20%
Preț: 319.75 lei -
Preț: 376.75 lei -
Preț: 371.00 lei -
Preț: 377.68 lei - 20%
Preț: 390.46 lei -
Preț: 379.51 lei - 20%
Preț: 250.79 lei - 20%
Preț: 493.97 lei -
Preț: 395.25 lei - 20%
Preț: 461.90 lei - 20%
Preț: 323.41 lei - 20%
Preț: 329.74 lei - 20%
Preț: 320.55 lei -
Preț: 381.55 lei - 20%
Preț: 647.15 lei -
Preț: 432.39 lei -
Preț: 376.75 lei -
Preț: 373.40 lei - 20%
Preț: 329.60 lei - 20%
Preț: 642.40 lei -
Preț: 374.91 lei -
Preț: 376.75 lei
Preț: 334.67 lei
Preț vechi: 418.33 lei
-20% Nou
Puncte Express: 502
Preț estimativ în valută:
59.22€ • 69.44$ • 52.01£
59.22€ • 69.44$ • 52.01£
Carte tipărită la comandă
Livrare economică 06-20 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319167442
ISBN-10: 3319167448
Pagini: 564
Ilustrații: XIII, 547 p. 92 illus.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.84 kg
Ediția:2015
Editura: Springer
Seria Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319167448
Pagini: 564
Ilustrații: XIII, 547 p. 92 illus.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.84 kg
Ediția:2015
Editura: Springer
Seria Security and Cryptology
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem’s Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random NumberGeneration in Wearable Computing Environments Using MEMS Sensors.