Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11060
Editat de Liqun Chen, Mark Manulis, Steve Schneideren Limba Engleză Paperback – 15 aug 2018
The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.37 lei - 20%
Preț: 461.65 lei - 20%
Preț: 461.32 lei - 20%
Preț: 390.69 lei - 20%
Preț: 527.36 lei - 15%
Preț: 388.50 lei - 20%
Preț: 461.52 lei - 20%
Preț: 390.35 lei - 20%
Preț: 496.64 lei - 20%
Preț: 461.52 lei - 20%
Preț: 389.72 lei - 15%
Preț: 461.85 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 252.15 lei - 20%
Preț: 391.14 lei - 20%
Preț: 532.54 lei - 20%
Preț: 461.83 lei - 20%
Preț: 255.91 lei - 20%
Preț: 498.46 lei - 20%
Preț: 497.55 lei - 20%
Preț: 499.36 lei - 20%
Preț: 390.12 lei - 20%
Preț: 391.20 lei - 20%
Preț: 532.41 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 390.94 lei - 20%
Preț: 391.86 lei - 20%
Preț: 389.85 lei - 20%
Preț: 498.32 lei - 20%
Preț: 462.67 lei - 20%
Preț: 460.98 lei - 20%
Preț: 424.26 lei - 20%
Preț: 639.72 lei - 15%
Preț: 535.92 lei - 20%
Preț: 532.28 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 461.57 lei - 20%
Preț: 498.50 lei - 20%
Preț: 461.83 lei - 20%
Preț: 249.95 lei
Preț: 331.17 lei
Preț vechi: 413.96 lei
-20% Nou
Puncte Express: 497
Preț estimativ în valută:
58.60€ • 68.72$ • 51.46£
58.60€ • 68.72$ • 51.46£
Carte tipărită la comandă
Livrare economică 04-18 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319991351
ISBN-10: 3319991353
Pagini: 500
Ilustrații: XI, 522 p. 85 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.74 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319991353
Pagini: 500
Ilustrații: XI, 522 p. 85 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.74 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Invited Paper.- Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.- Software Security.- Secure Code Execution: A Generic PUF-driven System Architecture.- Lumus: Dynamically Uncovering Evasive Android Applications.- ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.- How Safe is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.- Symmetric Ciphers and Cryptanalysis.- Speeding up MILP Aided Differential Characteristic Search with Mastui's Strategy.- Automatic Search for Related-key Differential Trails in SIMON-like Block Ciphers Based on MILP.- Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails.- Conditional Cube Searching and Applications on Trivium-Variant Ciphers.- Data Privacy and Anonymization.- Practical Attacks on Relational Databases Protected via Searchable Encryption.- A Simple Algorithm for Estimating Distribution Parameters from n-Dimensional Randomized Binary Responses.- Outsourcing and Assisted Computing.- Enforcing Access Control for the Cryptographic Cloud Service Invocation based on Virtual Machine Introspection.- Multi-Authority Fast Data Cloud-Outsourcing for Mobile Devices.- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT.- Offline Assisted Group Key Exchange.- Advanced Encryption.- Function-Dependent Commitments for Verifiable Multi-Party Computation.- On Constructing Pairing-free Identity-Based Encryptions.- Multi-Key Homomorphic Proxy Re-Encryption.- Verifiable Decryption for Fully Homomorphic Encryption.- Privacy-Preserving Applications.- Platform-independent Secure Blockchain-Based Voting System.- Privacy in Crowdsourcing: A Systematic Review.- Advanced Signatures.- Anonymous yet Traceable Strong Designated Verifier Signature.- Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.- Network Security.- Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic.- Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.- Cyber-risks in the Industrial Internet of Things: towards a method for continuous assessment.