Provable Security: Lecture Notes in Computer Science, cartea 11192
Editat de Joonsang Baek, Willy Susilo, Jongkil Kimen Limba Engleză Paperback – 7 oct 2018
Din seria Lecture Notes in Computer Science
- 20%
Preț: 733.68 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 449.81 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 850.42 lei - 20%
Preț: 386.08 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 620.33 lei - 20%
Preț: 620.33 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 435.28 lei - 20%
Preț: 748.63 lei - 20%
Preț: 633.70 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 675.83 lei - 20%
Preț: 678.21 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 560.93 lei - 20%
Preț: 556.96 lei - 20%
Preț: 313.10 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 15%
Preț: 558.12 lei - 20%
Preț: 563.29 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 20%
Preț: 562.49 lei - 15%
Preț: 672.87 lei - 20%
Preț: 571.88 lei - 20%
Preț: 478.59 lei - 20%
Preț: 984.64 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei - 20%
Preț: 313.87 lei - 20%
Preț: 314.86 lei - 20%
Preț: 793.92 lei - 18%
Preț: 945.44 lei
Preț: 329.14 lei
Preț vechi: 411.42 lei
-20%
Puncte Express: 494
Preț estimativ în valută:
58.20€ • 66.74$ • 50.30£
58.20€ • 66.74$ • 50.30£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783030014452
ISBN-10: 3030014452
Pagini: 436
Ilustrații: XI, 424 p. 42 illus.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030014452
Pagini: 436
Ilustrații: XI, 424 p. 42 illus.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
On the Leakage of Corrupted Garbled Circuits.- Location-Proof System Based on Secure Multi-Party Computations.- Verifiable Homomorphic Secret Sharing.- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security.- Secure Outsourcing of Cryptographic Circuits Manufacturing.- On the Hardness of Learning Parity with Noise over Rings.- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.- Multivariate Encryption Schemes Based on the Constrained MQ Problem.- Token-Based Multi-Input Functional Encryption.- On the CCA2 Security of McEliece in the Standard Model.- Efficient Attribute-Based Encryption with BlackBox Traceability.- A Code-Based Linkable Ring Signature Scheme.- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature.- Digital Signatures from the Middle-Product LWE.- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation.- A Simpler Construction of Identity-Based Ring Signatures from Lattices.- A Generic Construction of Sequential Aggregate MACs from Any MACs.- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher.- Modeling Privacy in WiFi Fingerprinting Indoor Localization.- Security Notions for Cloud Storage and Deduplication.- Forward Secrecy for SPAKE2.- User-Mediated Authentication Protocols and Unforgeability for Key Collision.- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing.- Signcryption with Quantum Random Oracles.- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.