Muutke küpsiste eelistusi

E-raamat: Innovative Security Solutions for Information Technology and Communications: 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 61,74 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023.

The 14 full papers included in the book were carefully reviewed and selected from 57 submissions. They focus on all theoretical and practical aspects related to information technology and communications security. 

BASS: Boolean Automorphisms Signature Scheme.- Shpilrain Using Page
Offsets for Detecting Control-Flow Anomalies.- Elementary Remarks on Some
Quadratic Based Identity Based Encryption Schemes.- SDVS Sender-Privacy in
the Multi-Party Setting.- Software Mitigation of RISC-V Spectre Attacks.- A
Modern Malware-oriented Dynamic Information Retrieval Tool.- M-Sel: A Message
Selection Functional Encryption from Simple Tools.- Deniable Public-Key
Authenticated Quantum Key Exchange.- Towards a secure and transparent
blockchain-based system for e-commerce
deliveries.- Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault
InjectionToolkit.- OpenBSD formal driver verification with SeL4.- An
Efficient Small Modulus Test and Its Applications to Delegated
Computation without Preprocessing.- Learning Homomorphisms with Rounding and
Pseudorandom Function.- Some Results on Related Key-IV Pairs of Espresso.