Atjaunināt sīkdatņu piekrišanu

Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 2326, 2025, Proceedings, Part II [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 543 pages, height x width: 235x155 mm, 65 Illustrations, color; 45 Illustrations, black and white; XIII, 543 p. 110 illus., 65 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15826
  • Izdošanas datums: 20-Jun-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031957636
  • ISBN-13: 9783031957635
  • Mīkstie vāki
  • Cena: 118,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 139,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 543 pages, height x width: 235x155 mm, 65 Illustrations, color; 45 Illustrations, black and white; XIII, 543 p. 110 illus., 65 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 15826
  • Izdošanas datums: 20-Jun-2025
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031957636
  • ISBN-13: 9783031957635

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

Side Channels: Not So Secure TSC.- G-DBREACH Attacks: Algorithmic
Techniques for Faster and Stronger Compression Side Channels.- Decompose and
conquer: ZVP attacks on GLV curves.- Wolf in Sheeps Clothing: Understanding
and Detecting Mobile Cloaking in Blackhat. Informatuion Security: Optimal
Communication Unbalanced Private Set Union.- Negative Results on
Information-theoretic Additive Randomized Encodings.- Two-party ECDSA with
JavaCard-based smartcards.- MSED: A Linguistic Steganalysis Method Based on
Multi-Granularity Semantic Extraction Using Dual-Mode Fusion. Privacy &
Anonymity: Privately Compute the Item with Maximal Weight Sum in Set
Intersection.- Algebraic Zero Knowledge Contingent Payment.- On Proofs of
Plaintext Knowledge for the Joye-Libert Encryption Scheme.- AQQUA: Augmenting
Quisquis with Auditability. Cryptanalysis: Security Analysis of Forward
Secure Log Sealing in Journald.- Generic Security of GCM-SST.- Revisiting the
attackers knowledge in inference attacks against Searchable Symmetric
Encryption.- On the Structural Properties of Toffoli Gate Composition in
ARADI: Implications for Algebraic Distinguishers. Attacks & Vulnerabilities:
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN
Bus Monitoring ECU Activations.- OCEAN: Open-World Contrastive Authorship
Identification.- The Impact of SBOM Generators on Vulnerability Assessment in
Python: A Comparison and a Novel Approach.- Protection Against Subversion
Corruptions via Reverse Firewalls in the Plain Universal Composability
Framework.