Muutke küpsiste eelistusi

E-raamat: Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings

  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 12024
  • Ilmumisaeg: 02-Mar-2020
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030417024
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 12024
  • Ilmumisaeg: 02-Mar-2020
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030417024

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019.





The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
Invited Paper.- How to Compartment Secrets - Trust Everybody, but Cut
the Cards (Invited Talk).- Authentication.- A Lattice-based Enhanced Privacy
ID.- A Generic View on the Unified Zero-Knowledge Protocol and its
Applications.- Cryptography.- Verifiable and Private Oblivious Polynomial
Evaluation.- Monomial Evaluation of Polynomial Functions Protected by
Threshold Implementations With an Illustration on AES.- Strong Designated
Verifier Signature Based on the Rank Metric.- A Lightweight Implementation of
NTRU Prime for the Post-Quantum Internet of Things.- Threats.- Fault
Injection Characterization on modern CPUs - From the ISA to the
Micro-Architecture.- Threat Analysis of Poisoning Attack against Ethereum
Blockchain.- A Template-based Method for the Generation of Attack Trees
(short paper).- Cybersecurity.- Analysis of QUIC Session Establishment and
its Implementations.- CompactFlow: A Hybrid Binary Format for Network Flow
Data.- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing
by Remote Entities.- Internet of Things.- Automated Security Analysis of IoT
Software Updates.- Towards a Context-Aware Security and Privacy as a Service
in the Internet of Things (short paper).