Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers: Lecture Notes in Computer Science, cartea 11286
Editat de Vashek Matyáš, Petr Švenda, Frank Stajano, Bruce Christianson, Jonathan Andersonen Limba Engleză Paperback – 24 noi 2018
The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 984.64 lei - 20%
Preț: 400.77 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 556.96 lei - 20%
Preț: 560.93 lei - 15%
Preț: 558.12 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 733.68 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 478.59 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 620.33 lei - 20%
Preț: 731.97 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 403.00 lei - 20%
Preț: 563.29 lei - 20%
Preț: 324.19 lei - 20%
Preț: 793.92 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 558.53 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 320.86 lei
Preț vechi: 401.08 lei
-20%
Puncte Express: 481
Preț estimativ în valută:
56.75€ • 65.58$ • 48.98£
56.75€ • 65.58$ • 48.98£
Carte tipărită la comandă
Livrare economică 25 aprilie-09 mai
Specificații
ISBN-13: 9783030032500
ISBN-10: 3030032507
Pagini: 320
Ilustrații: XI, 305 p. 30 illus., 19 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.45 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030032507
Pagini: 320
Ilustrații: XI, 305 p. 30 illus., 19 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.45 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Raven Authentication Service - Attacks and Countermeasures.- Raven Authentication Service - Attacks and Countermeasures (Transcript of Discussion).- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations.- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion).- Non-Monotonic Security Protocols and Failures in Financial Intermediation.- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion).- HoneyPAKEs.- HoneyPAKEs (Transcript of Discussion).- Entropy crowdsourcing - protocols for link key updates in wireless sensor Networks.- Entropy crowdsourcing - protocols for link key updates in wireless sensor networks (Transcript of Discussion).- Daemones non Operantur Nisi per Artem.- Daemones non Operantur Nisi per Artem (Transcript of Discussion).- Intentionality and agency in security.- Intentionality and agency in security (Transcript of Discussion).- Incentives in Security Protocols.- Incentives in Security Protocols (Transcript of Discussion).- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System.- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).- How does match-fixing inform computer game security.- How does match-fixing inform computer game security? (Transcript of Discussion).- From Secure Messaging to Secure Collaboration.- From Secure Messaging to Secure Collaboration (Transcript of Discussion).- Requirements for Root of Trust Establishment.- Requirements for Root of Trust Establishment (Transcript of Discussion).- User Authentication for the Internet of Things.- User Authentication for the Internet of Things (Transcript of Discussion).- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough.- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion).- Making Bitcoin Legal.- Making Bitcoin Legal (Transcript of Discussion).- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do.- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion).- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).