ei ole lubatud
ei ole lubatud
Digitaalõiguste kaitse (DRM)
Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).
Vajalik tarkvara
Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)
PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )
Seda e-raamatut ei saa lugeda Amazon Kindle's.
Lattice-based IBE with equality test in standard model.- A critique of game-based de?nitions of receipt-freeness for voting.- One-Round Authenticated Group Key Exchange from Isogenies.- History-Free Sequential Aggregate MAC Revisited.- An E?cient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/O?ine Certi?cateless Aggregate Signature.- Secure Online/O?ine Attribute-based Encryption for IOT Users in Cloud Computing.- Identity-Concealed Authenticated Encryption from Ring Learning With Errors.- Towards Enhanced Security for Certi?cateless Public-key Authenticated Encryption with Keyword Search.- TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-invisibility.- A Lattice-Based Anonymous Distributed E-Cash from Bitcoin.- Plaintext-Veri?ably-Checkable Encryption.- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem.- Hierarchical Functional Signcryption: Notion and Construction.- FSPVDsse: A Forward Secure Publicly Veri?able Dynamic SSE scheme.- A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection.- Password-based Authenticated Key Exchange from Standard Isogeny Assumptions.- A centralized digital currency system with rich functions.- A Practical Lattice-Based Sequential Aggregate Signature.- Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.- Space-E?cient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG.- A Coin-Free Oracle-Based Augmented Black Box Framework.- Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks.- Solving ECDLP via List Decoding.- On-demand Privacy Preservation for Cost-E?cient Edge Intelligence Model Training.