Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6280
Editat de Juan A. Garay, Roberto De Priscoen Limba Engleză Paperback – sep 2010
Din seria Lecture Notes in Computer Science
- 20%
Preț: 461.83 lei - 20%
Preț: 461.57 lei - 20%
Preț: 424.26 lei - 20%
Preț: 390.69 lei - 20%
Preț: 498.50 lei - 15%
Preț: 388.50 lei - 20%
Preț: 390.35 lei - 20%
Preț: 460.98 lei - 20%
Preț: 461.52 lei - 20%
Preț: 497.55 lei - 20%
Preț: 389.72 lei - 20%
Preț: 461.83 lei - 20%
Preț: 389.90 lei - 20%
Preț: 497.04 lei - 20%
Preț: 462.05 lei - 20%
Preț: 391.14 lei - 20%
Preț: 389.85 lei - 20%
Preț: 461.32 lei - 20%
Preț: 498.32 lei - 20%
Preț: 496.64 lei - 20%
Preț: 532.28 lei - 20%
Preț: 527.36 lei - 20%
Preț: 498.46 lei - 15%
Preț: 461.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 532.41 lei - 20%
Preț: 462.24 lei - 20%
Preț: 391.14 lei - 20%
Preț: 461.77 lei - 20%
Preț: 390.35 lei - 20%
Preț: 461.06 lei - 20%
Preț: 461.65 lei - 20%
Preț: 390.18 lei - 20%
Preț: 392.64 lei - 20%
Preț: 252.15 lei - 20%
Preț: 390.94 lei - 20%
Preț: 461.52 lei - 20%
Preț: 391.86 lei - 20%
Preț: 532.54 lei - 20%
Preț: 462.67 lei - 20%
Preț: 461.65 lei - 20%
Preț: 639.72 lei - 20%
Preț: 255.91 lei - 15%
Preț: 535.92 lei - 20%
Preț: 535.77 lei - 5%
Preț: 516.27 lei - 20%
Preț: 499.36 lei - 20%
Preț: 391.20 lei - 20%
Preț: 391.20 lei - 20%
Preț: 249.95 lei
Preț: 336.86 lei
Preț vechi: 421.08 lei
-20% Nou
Puncte Express: 505
Preț estimativ în valută:
59.61€ • 69.90$ • 52.35£
59.61€ • 69.90$ • 52.35£
Carte disponibilă
Livrare economică 09-23 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642153167
ISBN-10: 364215316X
Pagini: 474
Ilustrații: VII, 474 p. 54 illus.
Greutate: 0.91 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 364215316X
Pagini: 474
Ilustrații: VII, 474 p. 54 illus.
Greutate: 0.91 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Encryption I.- Time-Specific Encryption.- Public-Key Encryption with Efficient Amortized Updates.- Generic Constructions of Parallel Key-Insulated Encryption.- Invited Talk.- Heuristics and Rigor in Lattice-Based Cryptography.- Cryptanalysis.- Differential Fault Analysis of LEX.- Generalized RC4 Key Collisions and Hash Collisions.- Hash Functions.- On the Indifferentiability of the Grøstl Hash Function.- Side Channel Attacks and Leakage Resilience.- Algorithmic Tamper-Proof Security under Probing Attacks.- Leakage-Resilient Storage.- Encryption II.- Searching Keywords with Wildcards on Encrypted Data.- Threshold Attribute-Based Signcryption.- Cryptographic Protocols I.- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption.- Improved Primitives for Secure Multiparty Integer Computation.- How to Pair with a Human.- Authentication and Key Agreement.- A New Security Model for Authenticated Key Agreement.- A Security Enhancement and Proof for Authentication and Key Agreement (AKA).- Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model.- Cryptographic Primitives and Schemes.- Kleptography from Standard Assumptions and Applications.- Provably Secure Convertible Undeniable Signatures with Unambiguity.- History-Free Aggregate Message Authentication Codes.- Lattice-Based Cryptography.- Recursive Lattice Reduction.- Adaptively Secure Identity-Based Identification from Lattices without Random Oracles.- Groups Signatures and Authentication.- The Fiat–Shamir Transform for Group and Ring Signature Schemes.- Get Shorty via Group Signatures without Encryption.- Group Message Authentication.- Cryptographic Protocols II.- Fast Secure Computation of Set Intersection.- Distributed Private-Key Generators for Identity-BasedCryptography.- Anonymity.- Solving Revocation with Efficient Update of Anonymous Credentials.
Caracteristici
up-to-date results fast track conference proceedings state-of-the-art report