Muutke küpsiste eelistusi

Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 2627, 2019, Proceedings 2019 ed. [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 169 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 13 Illustrations, color; 58 Illustrations, black and white; IX, 169 p. 71 illus., 13 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 11738
  • Ilmumisaeg: 17-Sep-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 303031510X
  • ISBN-13: 9783030315108
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 169 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 13 Illustrations, color; 58 Illustrations, black and white; IX, 169 p. 71 illus., 13 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 11738
  • Ilmumisaeg: 17-Sep-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 303031510X
  • ISBN-13: 9783030315108

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions.
The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Improving Identity and Authentication Assurance in Research and Education Federations.- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations.- Is a Smarter Grid Also Riskier.- BioID: a Privacy-Friendly Identity Document.- On the Statistical Detection of Adversarial Instances over Encrypted Data.- Understanding Attestation: Analyzing Protocols that use Quotes.- Challenges of Using Trusted Computing for Collaborative Data Processing.- Secure Trust Evaluation Using Multipath and Referral Chain Methods.- Personal Cross-Platform Reputation.- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.