Lecture Notes in Computer Science: Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Taschenbuch
2015, ISBN: 9783319167442
[ED: Taschenbuch / Paperback], [PU: Springer Springer International Publishing Springer, Berlin], AUSFÜHRLICHERE BESCHREIBUNG: This book constitutes the thoroughly refereed post-conferenc… Mehr…
booklooker.de |
2014, ISBN: 9783319167442
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, Chin… Mehr…
BarnesandNoble.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
2008, ISBN: 9783319167442
[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Secu… Mehr…
booklooker.de |
2015, ISBN: 3319167448
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, Chin… Mehr…
Weltbild.de Nr. 64845563. Versandkosten:, 2-5 Werktage, DE. (EUR 0.00) Details... |
2015, ISBN: 9783319167442
10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, Buch, Softcover, 2015, [PU: Springer International Publishing], Springer Inter… Mehr…
lehmanns.de Versandkosten:sofort lieferbar. (EUR 0.00) Details... |
Lecture Notes in Computer Science: Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Taschenbuch
2015, ISBN: 9783319167442
[ED: Taschenbuch / Paperback], [PU: Springer Springer International Publishing Springer, Berlin], AUSFÜHRLICHERE BESCHREIBUNG: This book constitutes the thoroughly refereed post-conferenc… Mehr…
2014, ISBN: 9783319167442
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, Chin… Mehr…
2008
ISBN: 9783319167442
[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Secu… Mehr…
2015, ISBN: 3319167448
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, Chin… Mehr…
2015, ISBN: 9783319167442
10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, Buch, Softcover, 2015, [PU: Springer International Publishing], Springer Inter… Mehr…
Bibliographische Daten des bestpassenden Buches
Detailangaben zum Buch - Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Dongd
EAN (ISBN-13): 9783319167442
ISBN (ISBN-10): 3319167448
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2015
Herausgeber: Springer International Publishing Core >1 >T
Buch in der Datenbank seit 2015-04-18T15:58:08+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-12-18T05:34:14+01:00 (Zurich)
ISBN/EAN: 9783319167442
ISBN - alternative Schreibweisen:
3-319-16744-8, 978-3-319-16744-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: zhou, yun dong, yung, lin
Titel des Buches: lecture notes computer science, china 2014, information security, china beijing, motiers 2015, beijing von, lin
Daten vom Verlag:
Autor/in: Dongdai Lin; Moti Yung; Jianying Zhou
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Verlag: Springer; Springer International Publishing
547 Seiten
Erscheinungsjahr: 2015-04-08
Cham; CH
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XIII, 547 p. 92 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Anonymity; Authentication; Block cipher; Cryptanalysis; Cryptographic application; Cryptographic primitive; Elliptic curve cryptography; Encryption; Hash function; Lattice cryptography; Meet in the middle; Multiparty computation; Obfuscation; Oblivious transfer; Outsource computation; Privacy; Public key cryptography; Security protocols; Signature protocols; zero knowledge; Data and Information Security; Cryptology; Coding and Information Theory; Algorithms; Discrete Mathematics in Computer Science; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Algorithmen und Datenstrukturen; Mathematik für Informatiker; Diskrete Mathematik; EA
An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem’s Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random NumberGeneration in Wearable Computing Environments Using MEMS Sensors.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783030142339 Information Security and Cryptology by Fuchun Guo Paperback | Indigo Chapters (Fuchun Guo; Xinyi Huang; Moti Yung)
- 9783319308395 Information Security and Cryptology - ICISC 2015 (Soonhak Kwon; Aaram Yun)
- 9783319121598 Information Security And Cryptology - Icisc 2013 by Hyang-Sook Lee Paperback | Indigo Chapters (Herausgegeben:Lee, Hyang-Sook; Han, Dong-Guk)
< zum Archiv...