Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11125
Editat de Chunhua Su, Hiroaki Kikuchien Limba Engleză Paperback – 6 sep 2018
The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 336.09 lei
Preț vechi: 420.11 lei
-20% Nou
Puncte Express: 504
Preț estimativ în valută:
59.47€ • 69.74$ • 52.23£
59.47€ • 69.74$ • 52.23£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319998060
ISBN-10: 3319998064
Pagini: 900
Ilustrații: XIV, 624 p. 111 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319998064
Pagini: 900
Ilustrații: XIV, 624 p. 111 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
System Security.- Macros Finder: Do You Remember LOVELETTER.- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification.- Compact Ring Signature in the Standard Model for Blockchain.- Public key cryptography.- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE.- An Almost Non-Interactive Order Preserving Encryption Scheme.- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.- Searchable and functional encryption.- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.- Constrained (Verifiable) Pseudorandom Function from Functional Encryption.- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper).- (Post-quantum) Signature schemes.- Certificateless Public Key Signature Schemes from Standard Algorithms.- A New Design of Online/Offline Signatures Based on Lattice.- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation.- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures.- Security Protocols.- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes.- Keyword-Based Delegable Proofs of Storage.- A Generic Framework for Accountable Optimistic Fair Exchange Protocol.- Network Security.- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification.- A Two-Stage Classifier Approach for Network Intrusion Detection.- DSH: Deniable Secret Handshake Framework.- Authentication.- Non-adaptive Group-Testing Aggregate MAC Scheme.- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones.- Seeing is believing: authenticating users with what they see and remember.- Side-channel Attacks.- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks.- Recovering Memory Access Sequence with Differential Flush+Reload Attack.- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE.- Security for Cyber-Physical Systems.- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper).- Regulating IoT messages.- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks.- Security in Mobile Environment.- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.- Privacy-preserving data collection for mobile phone sensing tasks.- Secure Computation and Data Privacy.- M-ORAM Revisited: Security and Construction Updates.- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM.- (k,l)-clustering for Transactional Data Streams Anonymization.- Cryptographic Protocols.- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion.- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness.- An Efficient and Provably Secure Private Polynomial Evaluation Scheme.- Efficient Traceable Oblivious Transfer and Its Applications.