Muutke küpsiste eelistusi

E-raamat: Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings

  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 8804
  • Ilmumisaeg: 08-Oct-2014
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319120607
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 8804
  • Ilmumisaeg: 08-Oct-2014
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783319120607

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014. The 19 papers presented together with two invited papers were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on cryptographic building blocks; mini tutorial; attacks and countermeasures; tools and methods; and secure systems and applications.
Invited Paper I
Lightweight and Secure PUFs: A Survey (Invited Paper)
1(13)
Phuong Ha Nguyen
Durga Prasad Sahoo
Cryptographic Building Blocks I
Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?
14(14)
Abhishek Chakraborty
Bodhisatwa Mazumdar
Debdeep Mukhopadhyay
Implementing Cryptographic Pairings at Standard Security Levels
28(19)
Andreas Enge
Jerome Milan
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency
47(12)
Partha Sarathi Boy
Avishek Adhikari
Rui Xu
Kirill Morozov
Kouichi Sakurai
CASH: Cellular Automata Based Parameterized Hash
59(17)
Sukhendu Kuila
Dhiman Saha
Madhumangal Pal
Dipanwita Roy Chowdhury
Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
76(16)
Kunwar Singh
C. Pandu Rangan
A.K. Banerjee
Invited Paper II
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper)
92(18)
Radim Ostadal
Petr Svenda
Vaclav Matyas
Mini Tutorial
Differential Power Analysis Attack on SIMON and LED Block Ciphers
110(16)
Dillibabu Shanmugam
Ravikumar Selvam
Suganya Annadurai
Cryptographic Building Blocks II
Khudra: A New Lightweight Block Cipher for FPGAs
126(20)
Souvik Kolay
Debdeep Mukhopadhyay
FNR: Arbitrary Length Small Domain Block Cipher Proposal
146(9)
Sashank Dara
Scott Fluhrer
AEC: A Practical Scheme for Authentication with Error Correction
155(16)
Abhrajit Sengupta
Dhiman Saha
Shamit Ghosh
Deval Mehta
Dipanwita Roy Chowdhury
Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol
171(12)
Raghuvir Songhela
Manik Lal Das
Attacks and Countermeasures
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
183(18)
Nicolas Bruneau
Jean-Luc Danger
Sylvain Guilley
Annelie Heuser
Yannick Teglia
Analysis and Improvements of the DPA Contest v4 Implementation
201(18)
Shivam Bhasin
Nicolas Bruneau
Jean-Luc Danger
Sylvain Guilley
Zakaria Najm
Some Randomness Experiments on TRIVIUM
219(18)
Subhabrata Samajder
Palash Sarkar
Tools and Methods
Randomized Batch Verification of Standard ECDSA Signatures
237(19)
Sabyasachi Karati
Abhijit Das
Dipanwita Roychoudhury
Batch Verification of EdDSA Signatures
256(16)
Sabyasachi Karati
Abhijit Das
Faster Randomness Testing with the NIST Statistical Test Suite
272(13)
Marek Sys
Zdenek Riha
Secure Systems and Applications
t-Private Systems: Unified Private Memories and Computation
285(18)
Jungmin Park
Akhilesh Tyagi
Android Malware Analysis Using Ensemble Features
303(16)
A.M. Aswini
P. Vinod
Linux Malware Detection Using eXtended-Symmetric Uncertainty
319(14)
K.A. Asmitha
P. Vinod
Author Index 333