Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV047635490
    Format: 1 Online-Ressource (xiii, 393 Seiten) , 70 Illustrationen, 30 in Farbe
    ISBN: 9783030904029
    Series Statement: Lecture notes in computer science 13059
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90401-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90403-6
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949342239302882
    Format: XIII, 393 p. 70 illus., 30 illus. in color. , online resource.
    Edition: 1st ed. 2021.
    ISBN: 9783030904029
    Series Statement: Security and Cryptology ; 13059
    Content: This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.
    Note: Searchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- .
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030904012
    Additional Edition: Printed edition: ISBN 9783030904036
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1776462076
    Format: 1 Online-Ressource(XIII, 393 p. 70 illus., 30 illus. in color.)
    Edition: 1st ed. 2021.
    ISBN: 9783030904029
    Series Statement: Security and Cryptology 13059
    Content: Searchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- .
    Content: This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.
    Additional Edition: ISBN 9783030904012
    Additional Edition: ISBN 9783030904036
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030904012
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030904036
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV047626614
    Format: xiii, 393 Seiten , Illustrationen, Diagramme
    ISBN: 9783030904012
    Series Statement: Lecture notes in computer science 13059
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-030-90402-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Elektronische Unterschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edocfu_BV047635490
    Format: 1 Online-Ressource (xiii, 393 Seiten) : , 70 Illustrationen, 30 in Farbe.
    ISBN: 978-3-030-90402-9
    Series Statement: Lecture notes in computer science 13059
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90401-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90403-6
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edoccha_BV047635490
    Format: 1 Online-Ressource (xiii, 393 Seiten) : , 70 Illustrationen, 30 in Farbe.
    ISBN: 978-3-030-90402-9
    Series Statement: Lecture notes in computer science 13059
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90401-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90403-6
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almafu_BV047635490
    Format: 1 Online-Ressource (xiii, 393 Seiten) : , 70 Illustrationen, 30 in Farbe.
    ISBN: 978-3-030-90402-9
    Series Statement: Lecture notes in computer science 13059
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90401-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-90403-6
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783030045029?
Did you mean 9783030040291?
Did you mean 9783030201029?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages