Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11125
Editat de Chunhua Su, Hiroaki Kikuchien Limba Engleză Paperback – 6 sep 2018
The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 270.68 lei - 20%
Preț: 321.68 lei - 20%
Preț: 391.36 lei - 20%
Preț: 322.09 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 463.03 lei - 20%
Preț: 531.75 lei - 15%
Preț: 496.40 lei - 20%
Preț: 497.25 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei - 20%
Preț: 324.19 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 390.42 lei - 20%
Preț: 497.75 lei - 20%
Preț: 326.81 lei - 20%
Preț: 322.32 lei - 20%
Preț: 390.42 lei - 20%
Preț: 458.84 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 320.72 lei
Preț: 336.09 lei
Preț vechi: 420.11 lei
-20% Nou
Puncte Express: 504
Preț estimativ în valută:
59.47€ • 69.36$ • 52.22£
59.47€ • 69.36$ • 52.22£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319998060
ISBN-10: 3319998064
Pagini: 900
Ilustrații: XIV, 624 p. 111 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319998064
Pagini: 900
Ilustrații: XIV, 624 p. 111 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
System Security.- Macros Finder: Do You Remember LOVELETTER.- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection.- Universal Wavelet Relative Distortion: A New Counter Forensic Attack on Photo Response Non-Uniformity based Source Camera Identification.- Compact Ring Signature in the Standard Model for Blockchain.- Public key cryptography.- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE.- An Almost Non-Interactive Order Preserving Encryption Scheme.- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.- Searchable and functional encryption.- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.- Constrained (Verifiable) Pseudorandom Function from Functional Encryption.- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption (Invited paper).- (Post-quantum) Signature schemes.- Certificateless Public Key Signature Schemes from Standard Algorithms.- A New Design of Online/Offline Signatures Based on Lattice.- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.- Achieving Almost-Full Security for Lattice-based Fully Dynamic Group Signatures with Verifier-local Revocation.- Entanglement between Hash Encodings and Signatures from ID Schemes with Non-Binary Challenges: a Case Study on Lightweight Code-based Signatures.- Security Protocols.- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes.- Keyword-Based Delegable Proofs of Storage.- A Generic Framework for Accountable Optimistic Fair Exchange Protocol.- Network Security.- Towards Securing Challenge-based Collaborative Intrusion Detection Networks via Message Verification.- A Two-Stage Classifier Approach for Network Intrusion Detection.- DSH: Deniable Secret Handshake Framework.- Authentication.- Non-adaptive Group-Testing Aggregate MAC Scheme.- TMGMap: Designing Touch Movement-based Geographical Password Authentication on Smartphones.- Seeing is believing: authenticating users with what they see and remember.- Side-channel Attacks.- T SM: Elliptic Curve Scalar Multiplication Algorithm Secure against Single-Trace Attacks.- Recovering Memory Access Sequence with Differential Flush+Reload Attack.- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE.- Security for Cyber-Physical Systems.- Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices (Invited Paper).- Regulating IoT messages.- A security cycle clock synchronization method based on mobile reference nodes in Wireless Sensor Networks.- Security in Mobile Environment.- Attribute-based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.- Privacy-preserving data collection for mobile phone sensing tasks.- Secure Computation and Data Privacy.- M-ORAM Revisited: Security and Construction Updates.- Secure Computation of Inner Product of Vectors with Distributed Entries & its Applications to SVM.- (k,l)-clustering for Transactional Data Streams Anonymization.- Cryptographic Protocols.- A New Insight - Proxy Re-Encryption under LWE with Strong Anti-Collusion.- Hierarchical Secret Sharing Schemes Secure against Rushing Adversary:nn Cheater Identification and Robustness.- An Efficient and Provably Secure Private Polynomial Evaluation Scheme.- Efficient Traceable Oblivious Transfer and Its Applications.