feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1654837210
    Format: Online-Ressource (XVIII, 698 p. 152 illus. in color, online resource)
    Edition: 1st ed. 2015
    ISBN: 9783319281667
    Series Statement: Lecture Notes in Computer Science 9092
    Content: Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
    Content: This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
    Note: Literaturangaben , Secure computation: primitives and new modelsPublic key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
    Additional Edition: ISBN 9783319281650
    Additional Edition: Druckausg. ISBN 978-3-319-28165-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ACNS (13. : 2015 : New York, NY) Applied cryptography and network security Heidelberg : Springer, 2015 ISBN 9783319281650
    Additional Edition: ISBN 9783319281667
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Rechnernetz ; Datensicherung ; Computersicherheit ; Kryptoanalyse ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1658661044
    Format: Online-Ressource (XIII, 455 p. 92 illus, online resource)
    ISBN: 9783319458717
    Series Statement: Lecture Notes in Computer Science 9866
    Content: This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals
    Content: Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control -- Privacy and Watermarking -- Software Security -- Encryption, Signatures and Fundamentals
    Additional Edition: ISBN 9783319458700
    Additional Edition: Druckausg. ISBN 978-3-319-45870-0
    Additional Edition: Printed edition ISBN 9783319458700
    Language: English
    Keywords: Datensicherung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages