Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers 2012 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 396 pages, height x width: 235x155 mm, weight: 618 g, 56 Illustrations, black and white; X, 396 p. 56 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 7537
  • Izdošanas datums: 16-Oct-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642347037
  • ISBN-13: 9783642347030
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 396 pages, height x width: 235x155 mm, weight: 618 g, 56 Illustrations, black and white; X, 396 p. 56 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 7537
  • Izdošanas datums: 16-Oct-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642347037
  • ISBN-13: 9783642347030
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.- Cryptanalysis vs. Provable Security.- Boosting Scalability in Anomaly-Based Packed Executable Filtering.- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs.- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.- Adleman-Manders-Miller Root Extraction Method Revisited.- Multi-pixel Encryption Visual Cryptography.- An Improved Electronic Voting Scheme without a Trusted Random Number Generator.- Fault Attacks against the Miller Algorithm in Hessian Coordinates.- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.- Improved Tradeoff between Encapsulation and Decapsulation of HK09.- Non-interactive Deniable Authentication Protocols.- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.- Efficient Self-certified Signatures with Batch Verification.- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves.- Weak-Key Class of MISTY1 for Related-Key Differential Attack.- Cryptanalysis of Reduced-Round KLEIN Block Cipher.- An Efficient RSA Implementation without Precomputation.- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation.- Towards Attack Resilient Social Network Based Threshold Signing.- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.