Fr. 70.00

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Sommario

Secure computation: primitives and new models.- Public key cryptographic primitives.- Secure computation II: applications.- Anonymity and related applications.- Cryptanalysis and attacks (symmetric crypto).- Privacy and policy enforcement.- Authentication via eye tracking and proofs of proximity.- Malware analysis and side channel attacks.- Side channel countermeasures and tamper resistance/PUFs.- Leakage resilience and pseudorandomness.

Riassunto

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Dettagli sul prodotto

Con la collaborazione di Vladimi Kolesnikov (Editore), Vladimir Kolesnikov (Editore), Allison Lewko (Editore), Allison Bishop Lewko (Editore), Allison Lewko et al (Editore), Tal Malkin (Editore), Michalis Polychronakis (Editore)
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 30.09.2016
 
EAN 9783319281650
ISBN 978-3-31-928165-0
Pagine 698
Dimensioni 156 mm x 235 mm x 35 mm
Peso 1066 g
Illustrazioni XVIII, 698 p. 152 illus. in color.
Serie Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

C, Netzwerksicherheit, Wirtschaftsmathematik und -informatik, IT-Management, Kodierungstheorie und Verschlüsselung (Kryptologie), Netzwerk-Hardware, Kryptografie, Verschlüsselungstechnologie, Theoretische Informatik, computer science, Systems and Data Security, Data and Information Security, Theory of Computation, Computers and Society, Management of Computing and Information Systems, IT Operations, Computer Communication Networks, Computers, Maintenance & repairs, information architecture, Network Security, Ethical & social aspects of IT, Computer security, Computers and civilization, Management information systems, Coding theory & cryptology, Mathematical theory of computation, Data encryption, Data encryption (Computer science), Cryptology, Computer communication systems, Network hardware

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.