Tippenhauer / Sako | Applied Cryptography and Network Security | Buch | 978-3-030-78374-7 | sack.de

Buch, Englisch, Band 12727, 512 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 791 g

Reihe: Lecture Notes in Computer Science

Tippenhauer / Sako

Applied Cryptography and Network Security

19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II
1. Auflage 2021
ISBN: 978-3-030-78374-7
Verlag: Springer International Publishing

19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II

Buch, Englisch, Band 12727, 512 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 791 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-030-78374-7
Verlag: Springer International Publishing


The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.

The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows:

Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography;

Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

Tippenhauer / Sako Applied Cryptography and Network Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Analysis of Applied Systems.- Breaking and Fixing Third-Party Payment Service for Mobile Apps.- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library.- Secure Computations.- Privacy-Preserving Data Aggregation with Probabilistic Range Validation.- LLVM-based Circuit Compilation for Practical Secure Computation.- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings.- Cryptanalysis.- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.- Efficient Methods to Search for Best Differential Characteristics on SKINNY.- Towards Efficient LPN-Based Symmetric Encryption.- System Security.- A Differentially Private Hybrid Approach to Traffic Monitoring.- Proactive Detection of Phishing Kit Traffic.- Vestige: Identifying Binary Code Provenance for Vulnerability Detection.- SoK: Auditability and Accountability in DistributedPayment Systems.- Defending Web Servers Against Flash Crowd Attacks.- Cryptography and its Applications.- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures.- Cryptanalysis of the Binary Permuted Kernel Problem.- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms.- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols.- Improved Structured Encryption for SQL Databases via Hybrid Indexing.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.