Atjaunināt sīkdatņu piekrišanu

Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 1721, 2020, Proceedings 1st ed. 2020 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 259 pages, height x width: 235x155 mm, weight: 454 g, 37 Illustrations, color; 50 Illustrations, black and white; X, 259 p. 87 illus., 37 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 12586
  • Izdošanas datums: 22-Dec-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030666255
  • ISBN-13: 9783030666255
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 259 pages, height x width: 235x155 mm, weight: 454 g, 37 Illustrations, color; 50 Illustrations, black and white; X, 259 p. 87 illus., 37 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 12586
  • Izdošanas datums: 22-Dec-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030666255
  • ISBN-13: 9783030666255
Citas grāmatas par šo tēmu:

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual.
The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.


tPAKE: Typo-Tolerant Password-Authenticated Key Exchange.- PAS-TA-U:
PASsword-based Threshold Authentication with Password Update.- Re-Markable:
Stealing Watermarked Neural Networks through Synthesis.- Robust Adaptive
Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning.-
A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics.-
ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit
Permutation based ciphers with a case study on GIFT.- On Configurable SCA
Countermeasures Against Single Trace Attacks for the NTT.- HEDrone:
Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic
Encryption.- Fiat-Shamir with Aborts: From Identification Schemes to Linkable
Ring Signatures.- An Insecurity Study of Ethereum Smart Contracts.-
Cryptographically Secure Multi-Tenant Provisioning of FPGAs.- Experimental
results on higher-order differential spectra of 6 and 8-bit invertible
S-boxes.- Quantum Resource Estimates of GroversKey Search on ARIA.