Muutke küpsiste eelistusi

Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 2021, 2024, Proceedings [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 195 pages, kõrgus x laius: 235x155 mm, 25 Illustrations, color; 14 Illustrations, black and white; XII, 195 p. 39 illus., 25 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2489
  • Ilmumisaeg: 23-May-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031905865
  • ISBN-13: 9783031905865
Teised raamatud teemal:
  • Pehme köide
  • Hind: 57,96 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 68,19 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 195 pages, kõrgus x laius: 235x155 mm, 25 Illustrations, color; 14 Illustrations, black and white; XII, 195 p. 39 illus., 25 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2489
  • Ilmumisaeg: 23-May-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031905865
  • ISBN-13: 9783031905865
Teised raamatud teemal:
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy, ICSP 2024, held in Jamshedpur, India, during November 2021, 2024. 



The 12 full papers and 1 short paper included in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: Cryptanalysis and Other Attacks; Boolean Functions; Authentication and authorization, Cyber-physical systems security, Privacy-preserving technologies; Blockchain and Cryptocurrency, IoT security and privacy, Database security; Quantum Cryptography.
.- Cryptanalysis and Other Attacks.
.- SIS-Based Signature Schemes and Their Countermeasures: From Vulnerability
to Vigilance.
.- On the Security of AMRIBE, Anonymous Multi-receiver Identity-based
Encryption.
.- Algebraic Cryptanalysis and countermeasures of Lightweight Signature
Scheme based on Multivariate Quadratic Polynomials.
.- Boolean Functions.
.- Construction of Boolean functions with 2k-valued Walsh Spectrum and High
Nonlinearity.
.- On (Noisy) Simon's (Quantum) Algorithm for multi-shift Boolean Functions.
.- Authentication and authorization, Cyber-physical systems security,
Privacy-preserving technologies.
.- Generation of Believable Fake Integral Equations for Cyber Deception.
.- A Security and Privacy Model For Automotive.
.- MAP-ECC: Mutual Authentication Protocol for e-Agriculture using ECC.
.- Blockchain and Cryptocurrency, IoT security and privacy, Database
security.
.- Advanced Image Steganography: Leveraging SLIC and QWT for Robust Data
Hiding.
.- A Secure and Decentralized EHR System Using Blockchain and IPFS.
.- SQL Injection Detection.
.- Quantum Cryptography.
.- A Quantum Public Key Cryptographic Scheme using Entangled States and
Grover Operator.
.- An Efficient and Secure Quantum Group Signature with Applications to
Vehicular Ad Hoc Networks.