Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings

Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13099
  • Izdošanas datums: 08-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030925482
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 94,58 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13099
  • Izdošanas datums: 08-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030925482
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.

The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.

Encryption.- Cross-Domain Attribute-Based Access Control Encryption.-
Grain-128AEADv2: Strengthening the Initialization Against Key
Reconstruction.- Partition Oracles from Weak Key Forgeries.- Practical
Privacy-Preserving Face Identification based on FunctionHiding Functional
Encryption.- The Matrix Reloaded: Multiplication Strategies in FrodoKEM.-
Signatures.- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from
OR-Proofs.- Effcient Threshold-Optimal ECDSA.- GMMT: A Revocable Group Merkle
Multi-Tree Signature Scheme.- Issuer-Hiding Attribute-Based Credentials.-
Report and Trace Ring Signatures.- Selectively Linkable Group Signatures
Stronger Security and Preserved Verifiability.- Cryptographic Schemes and
Protocols.- FO-like Combiners and Hybrid Post-Quantum Cryptography.-
Linear-time oblivious permutations for SPDZ.- On the Higher-bit Version of
Approximate Inhomogeneous Short Integer Solution Problem.- Practical
Continuously Non-Malleable Randomness Encoders in the Random Oracle Model.-
Attacks and Counter-Measures.- Countermeasures against Backdoor Attacks
towards Malware Detectors.- Free By Design: On the Feasibility Of Free-Riding
Attacks Against Zero-Rated Services.- Function-private Conditional Disclosure
of Secrets and Multi-evaluation Threshold Distributed Point Functions.- How
Distance-bounding can Detect Internet Traffc Hijacking.- SoK: Secure Memory
Allocation.- Toward Learning Robust Detectors from Imbalanced Datasets
Leveraging Weighted Adversarial Training.- Towards Quantum Large-Scale
Password Guessing on Real-World Distributions.- Attestation and
Verification.- Anonymous Transactions with Revocation and Auditing in
Hyperledger Fabric.- Attestation Waves: Platform Trust via Remote Power
Analysis.- How (not) to Achieve both Coercion Resistance and Cast as Intended
Verifiability in Remote eVoting.- Subversion-Resistant Quasi-Adaptive NIZK
and Applications to Modular zk-SNARKs.- THC: Practical and Cost-Effective
Verification of Delegated Computation.- Tiramisu: Black-Box Simulation
Extractable NIZKs in the Updatable CRS Model.