Atjaunināt sīkdatņu piekrišanu

Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 1112, 2019, Proceedings 2020 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 253 pages, height x width: 235x155 mm, weight: 454 g, 29 Illustrations, color; 62 Illustrations, black and white; X, 253 p. 91 illus., 29 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12024
  • Izdošanas datums: 23-Feb-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030417018
  • ISBN-13: 9783030417017
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 253 pages, height x width: 235x155 mm, weight: 454 g, 29 Illustrations, color; 62 Illustrations, black and white; X, 253 p. 91 illus., 29 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12024
  • Izdošanas datums: 23-Feb-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030417018
  • ISBN-13: 9783030417017
This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019.





The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
Invited Paper.- How to Compartment Secrets - Trust Everybody, but Cut
the Cards (Invited Talk).- Authentication.- A Lattice-based Enhanced Privacy
ID.- A Generic View on the Unified Zero-Knowledge Protocol and its
Applications.- Cryptography.- Verifiable and Private Oblivious Polynomial
Evaluation.- Monomial Evaluation of Polynomial Functions Protected by
Threshold Implementations With an Illustration on AES.- Strong Designated
Verifier Signature Based on the Rank Metric.- A Lightweight Implementation of
NTRU Prime for the Post-Quantum Internet of Things.- Threats.- Fault
Injection Characterization on modern CPUs - From the ISA to the
Micro-Architecture.- Threat Analysis of Poisoning Attack against Ethereum
Blockchain.- A Template-based Method for the Generation of Attack Trees
(short paper).- Cybersecurity.- Analysis of QUIC Session Establishment and
its Implementations.- CompactFlow: A Hybrid Binary Format for Network Flow
Data.- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing
by Remote Entities.- Internet of Things.- Automated Security Analysis of IoT
Software Updates.- Towards a Context-Aware Security and Privacy as a Service
in the Internet of Things (short paper).