Muutke küpsiste eelistusi

E-raamat: Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings

Edited by , Edited by
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 13075
  • Ilmumisaeg: 03-Dec-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030918590
  • Formaat - EPUB+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 13075
  • Ilmumisaeg: 03-Dec-2021
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030918590

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on October 8, 2021, due to the COVID-19 pandemic.The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security.







 

Applied Cryptography.- An Aggregate Signature with Pre-Communication in the Plain Public Key Model.- The Adversary Capabilities In Practical Byzantine Fault Tolerance.- Privacy.- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.- Efficient permutation protocol for MPC in the head.- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78.- Formal Methods for Security and Trust.- Secure Implementation of a Quantum-Future GAKE Protocol.- Deciding a Fragment of (alpha, beta)-Privacy.- Systems Security.- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT.- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.- Towards Decentralized and Provably Secure Cross-Domain Solutions.