Atjaunināt sīkdatņu piekrišanu

Innovative Security Solutions for Information Technology and Communications: 15th International Conference, SecITC 2022, Virtual Event, December 89, 2022, Revised Selected Papers 1st ed. 2023 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 342 pages, height x width: 235x155 mm, weight: 539 g, 50 Illustrations, color; 65 Illustrations, black and white; X, 342 p. 115 illus., 50 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13809
  • Izdošanas datums: 12-May-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031326350
  • ISBN-13: 9783031326356
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 69,22 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 81,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 342 pages, height x width: 235x155 mm, weight: 539 g, 50 Illustrations, color; 65 Illustrations, black and white; X, 342 p. 115 illus., 50 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13809
  • Izdošanas datums: 12-May-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031326350
  • ISBN-13: 9783031326356
Citas grāmatas par šo tēmu:
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 89, 2022.





The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
Interactional Freedom and Cybersecurity.- Lightweight Permutation-Based
Cryptography for the Ultra-Low-Power Internet of Things.- Bridges connecting
Encryption Schemes.- Superpoly Recovery of Grain-128AEAD Using
Division Property.- On Single-Server Delegation of RSA.- Constructing Pairing
Free Unbounded Inner Product Functional Encryption Schemes with Unbounded
Inner Product Policy.- Efficient Distributed Keys Generation of Threshold
Paillier Cryptosystem.- Statistical tests for symmetric primitives An
application to NIST Lightweight finalists.- MILP-aided Cryptanalysis of the
FUTURE Block Cipher.- Easy-ABE: An Easy Ciphertext-Policy Attribute-Based
Encryption.- MOTUS: How Quantized Parameters Improve Protection of Model and
Its Inference Input.- Lightweight Authentication using Noisy Key Derived from
Physically Unclonable Function.- Card-Based Zero-Knowledge Proof Protocol
for Pancake Sorting.- Activity Detection from Encrypted Remote Desktop
Protocol Traffic.- Application-Oriented Anonymization Framework for Social
Network Datasets and IoT Environments.- AI-Powered Vulnerability Detection
for Secure Source Code Development.- Towards Verifying Physical Assumption
in Card-Based Cryptography.- The Security of Quasigroups Based
Substitution Permutation Networks.- Unbounded Revocable
Decentralized Multi-Authority Attribute-Based Encryption Supporting
Non-Monotone Access Structures.