Applied Cryptography and Network Security
13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
Seiten
2016
|
1st ed. 2015
Springer International Publishing (Verlag)
978-3-319-28165-0 (ISBN)
Springer International Publishing (Verlag)
978-3-319-28165-0 (ISBN)
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
Secure computation: primitives and new models.- Public key cryptographic primitives.- Secure computation II: applications.- Anonymity and related applications.- Cryptanalysis and attacks (symmetric crypto).- Privacy and policy enforcement.- Authentication via eye tracking and proofs of proximity.- Malware analysis and side channel attacks.- Side channel countermeasures and tamper resistance/PUFs.- Leakage resilience and pseudorandomness.
| Erscheinungsdatum | 08.10.2016 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XVIII, 698 p. 152 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | anonymity • applied cryptography • Attacks • Big Data • Case Studies • Computer Science • digital currencies • hardware security • impossibility results • industrial challenges • Kryptographie / Kryptologie • Network Security • Netzwerksicherheit • new paradigms • new paradigms or non-traditional perspectives • non-traditional perspectives • outsourced computation • privacy • privacy metrics • provably secure protocols • Public Key Cryptography • security • security and privacy for big data • security and privacy metrics • security metrics • symmetric key cryptography • symmetric or public key cryptography • systems and data security |
| ISBN-10 | 3-319-28165-8 / 3319281658 |
| ISBN-13 | 978-3-319-28165-0 / 9783319281650 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
CHF 27,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95