- 5 Ergebnisse
Kleinster Preis: € 53,49, größter Preis: € 89,33, Mittelwert: € 70,38
1
Lecture Notes in Computer Science: Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Lin, Dongdai (Hrsg.) / Lin, Dongdai / Yung, Moti (Hrsg.) / Yung, Moti / Zhou, Jianying (Hrsg.) / Zhou, Jianying
Bestellen
bei booklooker.de
€ 77,04
Versand: € 0,001
Bestellengesponserter Link
Lin, Dongdai (Hrsg.) / Lin, Dongdai / Yung, Moti (Hrsg.) / Yung, Moti / Zhou, Jianying (Hrsg.) / Zhou, Jianying:

Lecture Notes in Computer Science: Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers - Taschenbuch

2015, ISBN: 9783319167442

[ED: Taschenbuch / Paperback], [PU: Springer Springer International Publishing Springer, Berlin], AUSFÜHRLICHERE BESCHREIBUNG: This book constitutes the thoroughly refereed post-conferenc… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Syndikat Buchdienst
2
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Dongd
Bestellen
bei BarnesandNoble.com
€ 54,99
Bestellengesponserter Link
Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Dongd - neues Buch

2014, ISBN: 9783319167442

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, Chin… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
3
Information Security and Cryptology - Dongdai Lin
Bestellen
bei booklooker.de
€ 89,33
Versand: € 0,001
Bestellengesponserter Link
Dongdai Lin:
Information Security and Cryptology - Taschenbuch

2008

ISBN: 9783319167442

[ED: Taschenbuch], [PU: Springer-Verlag GmbH], Neuware - This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Secu… Mehr…

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) buchversandmimpf2000
4
Information Security and Cryptology, Kartoniert (TB)
Bestellen
bei Weltbild.de
€ 53,49
Versand: € 0,001
Bestellengesponserter Link
Information Security and Cryptology, Kartoniert (TB) - neues Buch

2015, ISBN: 3319167448

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, Chin… Mehr…

Nr. 64845563. Versandkosten:, 2-5 Werktage, DE. (EUR 0.00)
5
Information Security and Cryptology - Dongdai Lin; Moti Yung; Jianying Zhou
Bestellen
bei lehmanns.de
€ 77,04
Versand: € 0,001
Bestellengesponserter Link
Dongdai Lin; Moti Yung; Jianying Zhou:
Information Security and Cryptology - Taschenbuch

2015, ISBN: 9783319167442

10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, Buch, Softcover, 2015, [PU: Springer International Publishing], Springer Inter… Mehr…

Versandkosten:sofort lieferbar. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Dongd


EAN (ISBN-13): 9783319167442
ISBN (ISBN-10): 3319167448
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2015
Herausgeber: Springer International Publishing Core >1 >T

Buch in der Datenbank seit 2015-04-18T15:58:08+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-12-18T05:34:14+01:00 (Zurich)
ISBN/EAN: 9783319167442

ISBN - alternative Schreibweisen:
3-319-16744-8, 978-3-319-16744-2
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: zhou, yun dong, yung, lin
Titel des Buches: lecture notes computer science, china 2014, information security, china beijing, motiers 2015, beijing von, lin


Daten vom Verlag:

Autor/in: Dongdai Lin; Moti Yung; Jianying Zhou
Titel: Lecture Notes in Computer Science; Security and Cryptology; Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Verlag: Springer; Springer International Publishing
547 Seiten
Erscheinungsjahr: 2015-04-08
Cham; CH
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XIII, 547 p. 92 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Anonymity; Authentication; Block cipher; Cryptanalysis; Cryptographic application; Cryptographic primitive; Elliptic curve cryptography; Encryption; Hash function; Lattice cryptography; Meet in the middle; Multiparty computation; Obfuscation; Oblivious transfer; Outsource computation; Privacy; Public key cryptography; Security protocols; Signature protocols; zero knowledge; Data and Information Security; Cryptology; Coding and Information Theory; Algorithms; Discrete Mathematics in Computer Science; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Algorithmen und Datenstrukturen; Mathematik für Informatiker; Diskrete Mathematik; EA

An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem’s Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random NumberGeneration in Wearable Computing Environments Using MEMS Sensors.

< zum Archiv...