Atjaunināt sīkdatņu piekrišanu

Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings 1st ed. 2021 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 205 pages, height x width: 235x155 mm, weight: 338 g, 17 Illustrations, color; 17 Illustrations, black and white; IX, 205 p. 34 illus., 17 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 13075
  • Izdošanas datums: 04-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030918580
  • ISBN-13: 9783030918583
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 60,29 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 70,94 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 205 pages, height x width: 235x155 mm, weight: 338 g, 17 Illustrations, color; 17 Illustrations, black and white; IX, 205 p. 34 illus., 17 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 13075
  • Izdošanas datums: 04-Dec-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030918580
  • ISBN-13: 9783030918583
Citas grāmatas par šo tēmu:
This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on October 8, 2021, due to the COVID-19 pandemic.The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security.







 

Applied Cryptography.- An Aggregate Signature with Pre-Communication in the Plain Public Key Model.- The Adversary Capabilities In Practical Byzantine Fault Tolerance.- Privacy.- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.- Efficient permutation protocol for MPC in the head.- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78.- Formal Methods for Security and Trust.- Secure Implementation of a Quantum-Future GAKE Protocol.- Deciding a Fragment of (alpha, beta)-Privacy.- Systems Security.- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT.- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.- Towards Decentralized and Provably Secure Cross-Domain Solutions.