Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    edoccha_BV048637695
    Format: 1 Online-Ressource (ix, 291 Seiten) : , 54 Illustrationen, 29 in Farbe.
    ISBN: 978-3-031-20917-8
    Series Statement: Lecture notes in computer science 13600
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20916-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20918-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Elektronische Unterschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_BV048637695
    Format: 1 Online-Ressource (ix, 291 Seiten) : , 54 Illustrationen, 29 in Farbe.
    ISBN: 978-3-031-20917-8
    Series Statement: Lecture notes in computer science 13600
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20916-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20918-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Elektronische Unterschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edocfu_BV048637695
    Format: 1 Online-Ressource (ix, 291 Seiten) : , 54 Illustrationen, 29 in Farbe.
    ISBN: 978-3-031-20917-8
    Series Statement: Lecture notes in computer science 13600
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20916-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20918-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Elektronische Unterschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV048637695
    Format: 1 Online-Ressource (ix, 291 Seiten) , 54 Illustrationen, 29 in Farbe
    ISBN: 9783031209178
    Series Statement: Lecture notes in computer science 13600
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20916-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-20918-5
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Datensicherung ; Kryptologie ; Chiffrierung ; Kryptosystem ; Schlüsselaustauschprotokoll ; Elektronische Unterschrift ; Beweisbarkeit ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Interaktives Beweissystem ; Sicherheitsprotokoll ; Interaktives Beweissystem ; Hash-Algorithmus ; Kryptosystem ; Kryptologie ; Software Engineering ; Datenstruktur ; Elektronische Unterschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_182119263X
    Format: 1 Online-Ressource(X, 291 p. 54 illus., 29 illus. in color.)
    Edition: 1st ed. 2022.
    ISBN: 9783031209178
    Series Statement: Lecture Notes in Computer Science 13600
    Content: Encryption -- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test -- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search -- More Efficient Verifiable Functional Encryption -- Subverting Deniability -- Epoch Confidentiality in Updatable Encryption -- Lattice Based Cryptography -- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices -- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask -- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems -- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices -- Information Security -- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks -- Construction of a New UAV Management System based on UMIA Technology -- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning -- Practical Federated Learning for Samples with Different IDs -- Blockchain -- Reinforcement-Mining: Protecting Reward in Selfish Mining -- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks -- Secure Collaboration between Consortiums in Permissioned Blockchains -- Foundations -- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge -- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model -- Cryptographic Role-Based Access Control, Reconsidered.
    Content: This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
    Additional Edition: ISBN 9783031209161
    Additional Edition: ISBN 9783031209185
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783031209161
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783031209185
    Language: English
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949407268602882
    Format: IX, 291 p. 54 illus., 29 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9783031209178
    Series Statement: Lecture Notes in Computer Science, 13600
    Content: This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11-12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.
    Note: Encryption -- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test -- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search -- More Efficient Verifiable Functional Encryption -- Subverting Deniability -- Epoch Confidentiality in Updatable Encryption -- Lattice Based Cryptography -- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices -- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask -- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems -- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices -- Information Security -- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks -- Construction of a New UAV Management System based on UMIA Technology -- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning -- Practical Federated Learning for Samples with Different IDs -- Blockchain -- Reinforcement-Mining: Protecting Reward in Selfish Mining -- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks -- Secure Collaboration between Consortiums in Permissioned Blockchains -- Foundations -- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge -- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model -- Cryptographic Role-Based Access Control, Reconsidered.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031209161
    Additional Edition: Printed edition: ISBN 9783031209185
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783031209611?
Did you mean 9783031209116?
Did you mean 9783030219161?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages