logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings

Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Paperback)

Stephan Krenn, Marc Stevens, Mauro Conti (엮은이)
Springer
222,000원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
182,040원 -18% 0원
9,110원
172,930원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings
eBook 미리보기

책 정보

· 제목 : Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783030925475
· 쪽수 : 554쪽
· 출판일 : 2021-12-09

목차

Encryption.- Cross-Domain Attribute-Based Access Control Encryption.- Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.- Partition Oracles from Weak Key Forgeries.- Practical Privacy-Preserving Face Identification based on FunctionHiding Functional Encryption.- The Matrix Reloaded: Multiplication Strategies in FrodoKEM.- Signatures.- BlindOR: An Effcient Lattice-Based Blind Signature Scheme from OR-Proofs.- Effcient Threshold-Optimal ECDSA.- GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme.- Issuer-Hiding Attribute-Based Credentials.- Report and Trace Ring Signatures.- Selectively Linkable Group Signatures ? Stronger Security and Preserved Verifiability.- Cryptographic Schemes and Protocols.- FO-like Combiners and Hybrid Post-Quantum Cryptography.- Linear-time oblivious permutations for SPDZ.- On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem.- Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model.- Attacks and Counter-Measures.- Countermeasures against Backdoor Attacks towards Malware Detectors.- Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services.- Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions.- How Distance-bounding can Detect Internet Traffc Hijacking.- SoK: Secure Memory Allocation.- Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.- Towards Quantum Large-Scale Password Guessing on Real-World Distributions.- Attestation and Verification.- Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.- Attestation Waves: Platform Trust via Remote Power Analysis.- How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting.- Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs.- THC: Practical and Cost-Effective Verification of Delegated Computation.- Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model.

저자소개

Marc Stevens (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책