Bültmann & Gerriets
Applied Cryptography and Network Security
19th International Conference, ACNS 2021, Kamakura, Japan, June 21¿24, 2021, Proceedings, Part II
von Nils Ole Tippenhauer, Kazue Sako
Verlag: Springer International Publishing
Reihe: Security and Cryptology Nr. 12727
Hardcover
ISBN: 978-3-030-78374-7
Auflage: 1st ed. 2021
Erschienen am 10.06.2021
Sprache: Englisch
Format: 235 mm [H] x 155 mm [B] x 29 mm [T]
Gewicht: 791 Gramm
Umfang: 528 Seiten

Preis: 85,59 €
keine Versandkosten (Inland)


Dieser Titel wird erst bei Bestellung gedruckt. Eintreffen bei uns daher ca. am 11. November.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

85,59 €
merken
zum E-Book (PDF) 85,59 €
klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Klappentext
Inhaltsverzeichnis

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows:
Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography;
Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.



Analysis of Applied Systems.- Breaking and Fixing Third-Party Payment Service for Mobile Apps.- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library.- Secure Computations.- Privacy-Preserving Data Aggregation with Probabilistic Range Validation.- LLVM-based Circuit Compilation for Practical Secure Computation.- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings.- Cryptanalysis.- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.- Efficient Methods to Search for Best Differential Characteristics on SKINNY.- Towards Efficient LPN-Based Symmetric Encryption.- System Security.- A Differentially Private Hybrid Approach to Traffic Monitoring.- Proactive Detection of Phishing Kit Traffic.- Vestige: Identifying Binary Code Provenance for Vulnerability Detection.- SoK: Auditability and Accountability in DistributedPayment Systems.- Defending Web Servers Against Flash Crowd Attacks.- Cryptography and its Applications.- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures.- Cryptanalysis of the Binary Permuted Kernel Problem.- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms.- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.- Improved Structured Encryption for SQL Databases via Hybrid Indexing.


andere Formate
weitere Titel der Reihe