Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers - neues Buch
2014, ISBN: 9783319159430
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…
hive.co.uk No. 9783319159430. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2014, ISBN: 9783319159430
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…
Springer.com new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00) Details... |
2014, ISBN: 9783319159430
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…
kobo.com Versandkosten:Zzgl. Versandkosten., zzgl. Versandkosten Details... |
2014, ISBN: 9783319159430
Computer Science; Systems and Data Security; Data Encryption; Management of Computing and Information Systems AES, Application Plagiarism, Ciphers, Cryptanalysis, Cryptographic Protocols,… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers - neues Buch
2014, ISBN: 9783319159430
; PDF; Computing > Computer security, Springer Berlin Heidelberg
hive.co.uk No. 9783319159430. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
Information Security and Cryptology - ICISC 2014 : 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers - neues Buch
2014, ISBN: 9783319159430
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…
2014, ISBN: 9783319159430
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…
2014
ISBN: 9783319159430
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Kor… Mehr…
2014, ISBN: 9783319159430
Computer Science; Systems and Data Security; Data Encryption; Management of Computing and Information Systems AES, Application Plagiarism, Ciphers, Cryptanalysis, Cryptographic Protocols,… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Information Security and Cryptology - ICISC 2014
EAN (ISBN-13): 9783319159430
Erscheinungsjahr: 3
Herausgeber: Springer
Buch in der Datenbank seit 2015-06-21T05:46:16+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-01-20T11:56:21+01:00 (Zurich)
ISBN/EAN: 9783319159430
ISBN - alternative Schreibweisen:
978-3-319-15943-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: esposito, anna springer, kim
Titel des Buches: information security, seoul
Daten vom Verlag:
Autor/in: Jooyoung Lee; Jongsung Kim
Titel: Security and Cryptology; Lecture Notes in Computer Science; Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers
Verlag: Springer; Springer International Publishing
448 Seiten
Erscheinungsjahr: 2015-03-16
Cham; CH
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIII, 448 p. 83 illus.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Computersicherheit; Verstehen; AES; Application Plagiarism; Ciphers; Cryptanalysis; Cryptographic Protocols; Data Hiding; Digital Watermarking; Embedded Systems; Fault Analysis; Fingerprint; Formal Methods; Hash Functions; Oblivious Transfer; Phishing; Post-Quantum Cryptography; Provable Security; Public-Key Cryptography; Security Model; Side-Channel Analysis; Social Network Security; C; Data and Information Security; Cryptology; IT Operations; Computer Science; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; BC
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.- On the Security of Distributed Multiprime RSA.- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme.- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1.- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors.- How Much Can Complexity of Linear Cryptanalysis Be Reduced?.- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.- Bicliques with Minimal Data and Time Complexity for AES.- Fault Analysis on SIMON Family of Lightweight Block Ciphers.- A Clustering Approach for Privacy-Preserving in Social Networks.- Securely Solving Classical Network Flow Problems.- Remote IP Protection Using Timing Channels.- Detecting Camouflaged Applications on Mobile Application Markets.- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.- LSH: A New Fast Secure Hash Function Family.- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern.- Montgomery Modular Multiplication on ARM-NEON Revisited.- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.- Compact and Efficient UC Commitments Under Atomic-Exchanges.- Issuer-Free Adaptive Oblivious Transfer with Access Policy.- Memory Address Side-Channel Analysis on Exponentiation.- Mutant Differential Fault Analysis of Trivium MDFA.Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030409203 Information Security and Cryptology ? ICISC 2019 (Jae Hong Seo)
- 9783030409203 Information Security and Cryptology ? ICISC 2019 (Jae Hong Seo)
- 9783030429201 Information Security and Cryptology (Zhe Liu; Moti Yung)
- 9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783319159423 Information Security and Cryptology - ICISC 2014 by Jooyoung Lee Paperback | Indigo Chapters (Jooyoung Lee; Jongsung Kim)
< zum Archiv...