Security Protocols XXVI: Lecture Notes in Computer Science, cartea 11286
Editat de Vashek Matyá¿, Petr ¿Venda, Frank Stajano, Bruce Christianson, Jonathan Andersonen Limba Engleză Paperback – 24 noi 2018
The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 323.17 lei
Preț vechi: 403.96 lei
-20%
Puncte Express: 485
Preț estimativ în valută:
57.11€ • 65.92$ • 49.81£
57.11€ • 65.92$ • 49.81£
Carte tipărită la comandă
Livrare economică 18 mai-01 iunie
Specificații
ISBN-13: 9783030032500
ISBN-10: 3030032507
Pagini: 320
Ilustrații: XI, 305 p. 30 illus., 19 illus. in color.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030032507
Pagini: 320
Ilustrații: XI, 305 p. 30 illus., 19 illus. in color.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Raven Authentication Service - Attacks and Countermeasures.- Raven Authentication Service - Attacks and Countermeasures (Transcript of Discussion).- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations.- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion).- Non-Monotonic Security Protocols and Failures in Financial Intermediation.- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion).- HoneyPAKEs.- HoneyPAKEs (Transcript of Discussion).- Entropy crowdsourcing - protocols for link key updates in wireless sensor Networks.- Entropy crowdsourcing - protocols for link key updates in wireless sensor networks (Transcript of Discussion).- Daemones non Operantur Nisi per Artem.- Daemones non Operantur Nisi per Artem (Transcript of Discussion).- Intentionality and agency in security.- Intentionality and agency in security (Transcript of Discussion).- Incentives in Security Protocols.- Incentives in Security Protocols (Transcript of Discussion).- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System.- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).- How does match-fixing inform computer game security.- How does match-fixing inform computer game security? (Transcript of Discussion).- From Secure Messaging to Secure Collaboration.- From Secure Messaging to Secure Collaboration (Transcript of Discussion).- Requirements for Root of Trust Establishment.- Requirements for Root of Trust Establishment (Transcript of Discussion).- User Authentication for the Internet of Things.- User Authentication for the Internet of Things (Transcript of Discussion).- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough.- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion).- Making Bitcoin Legal.- Making Bitcoin Legal (Transcript of Discussion).- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do.- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion).- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).