• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

ISBN-13: 9783642019562 / Angielski / Miękka / 2009 / 535 str.

Michel Abdalla
Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings Abdalla, Michel 9783642019562 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Applied Cryptography and Network Security: 7th International Conference, Acns 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings

ISBN-13: 9783642019562 / Angielski / Miękka / 2009 / 535 str.

Michel Abdalla
cena 201,72 zł
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

ACNS2009, the7thInternationalConferenceonAppliedCryptographyandN- work Security, was held in Paris-Rocquencourt, France, June 2-5, 2009. ACNS 2009 was organized by the Ecole Normale Sup erieure (ENS), the French - tional Center for Scienti?c Research (CNRS), and the French National Institute for Researchin Computer Science andControl(INRIA), in cooperationwith the InternationalAssociation for CryptologicResearch(IACR). The General Chairs of the conference were Pierre-Alain Fouque and Damien Vergnaud. Theconferencereceived150submissionsandeachsubmissionwasassignedto at least three committee members. Submissions co-authored by members of the Program Committee were assigned to at least four committee members. Due to thelargenumber ofhigh-qualitysubmissions, thereviewprocesswaschallenging andwearedeeplygratefulto the committeemembersandthe externalreviewers for their outstanding work. After meticulous deliberation, the Program C- mittee, which was chaired by Michel Abdalla and David Pointcheval, selected 32 submissions for presentation in the academic track and these are the articles that are included in this volume. Additionally, a few other submissions were selected for presentation in the non-archival industrial track. The best student paper was awarded to Ayman Jarrous for his paper "Secure Hamming Distance Based Computation and Its Applications," co-authoredwith Benny Pinkas. The review process was run using the iChair software, written by Thomas Baigneres and Matthieu Finiasz from EPFL, LASEC, Switzerland and we are indebted to them for letting us use their software. The programalso included four invited talks in addition to the academicand industrial tracks.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - Cryptography & Encryption
Computers > Security - Network Security
Computers > Computer Science
Wydawca:
Springer
Seria wydawnicza:
Lecture Notes in Computer Science / Security and Cryptology
Język:
Angielski
ISBN-13:
9783642019562
Rok wydania:
2009
Wydanie:
2009
Numer serii:
000379702
Ilość stron:
535
Waga:
0.84 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Wolumenów:
01

Key Exchange.- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior.- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.- Secure Computation.- Novel Precomputation Schemes for Elliptic Curve Cryptosystems.- Practical Secure Evaluation of Semi-private Functions.- Secure Hamming Distance Based Computation and Its Applications.- Efficient Robust Private Set Intersection.- Public-Key Encryption.- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.- An Efficient Identity-Based Online/Offline Encryption Scheme.- Dual-Policy Attribute Based Encryption.- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.- Network Security I.- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.- Traitor Tracing.- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.- Tracing and Revoking Pirate Rebroadcasts.- Authentication and Anonymity.- Efficient Deniable Authentication for Signatures.- Homomorphic MACs: MAC-Based Integrity for Network Coding.- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks.- Hash Functions.- Cryptanalysis of Twister.- Cryptanalysis of CubeHash.- Collision Attack on Boole.- Network Security II.- Integrity Protection for Revision Control.- Fragility of the Robust Security Network: 802.11 Denial of Service.- Fast Packet Classification Using Condition Factorization.- Lattices.- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.- Broadcast Attacks against Lattice-Based Cryptosystems.- Partial Key Exposure Attack on CRT-RSA.- Side-Channel Attacks.- How to Compare Profiled Side-Channel Attacks?.- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.- Attacking ECDSA-Enabled RFID Devices.

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.

The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia