2010, ISBN: 9783642162794
Springer, Taschenbuch, Auflage: 2010, 289 Seiten, Publiziert: 2010-09-27T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 43187-3866, 0.97 kg, Informationsmanagement, Management, Business … Altro …
amazon.de |
2010, ISBN: 9783642162794
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.The 17 papers presented were carefully reviewed and selected from 4… Altro …
Indigo.ca new in stock. Costi di spedizione:zzgl. Versandkosten., Costi di spedizione aggiuntivi Details... |
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings 2010 - libri usati
2010, ISBN: 9783642162794
2010 Neubindung, Buchrücken leicht angestoßen 9294164/12 Versandkostenfreie Lieferung formal security models,provable securi,secure block ciphers,block ciphers,lattice-based security,calc… Altro …
buchfreund.de Buchpark GmbH, 14959 Trebbin Costi di spedizione:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
2010, ISBN: 9783642162794
Paperback, [PU: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG], This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 20… Altro …
BookDepository.com Costi di spedizione:Versandkostenfrei. (EUR 0.00) Details... |
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings - libri usati
2010, ISBN: 9783642162794
[PU: Springer Berlin], Neubindung, Buchrücken leicht angestoßen 9294164/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2010, PayPal, Klarna-Sofortüberweisung, Internationa… Altro …
booklooker.de |
Provable Security: 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings (Lecture Notes in Computer Science, 6402, Band 6402) - edizione con copertina flessibile
2010, ISBN: 9783642162794
Springer, Taschenbuch, Auflage: 2010, 289 Seiten, Publiziert: 2010-09-27T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 43187-3866, 0.97 kg, Informationsmanagement, Management, Business … Altro …
2010, ISBN: 9783642162794
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.The 17 papers presented were carefully reviewed and selected from 4… Altro …
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings 2010 - libri usati
2010
ISBN: 9783642162794
2010 Neubindung, Buchrücken leicht angestoßen 9294164/12 Versandkostenfreie Lieferung formal security models,provable securi,secure block ciphers,block ciphers,lattice-based security,calc… Altro …
2010, ISBN: 9783642162794
Paperback, [PU: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG], This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 20… Altro …
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings - libri usati
2010, ISBN: 9783642162794
[PU: Springer Berlin], Neubindung, Buchrücken leicht angestoßen 9294164/12, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2010, PayPal, Klarna-Sofortüberweisung, Internationa… Altro …
Dati bibliografici del miglior libro corrispondente
Autore: | |
Titolo: | |
ISBN: |
Informazioni dettagliate del libro - Provable Security by Kaoru Kurosawa Paperback | Indigo Chapters
EAN (ISBN-13): 9783642162794
ISBN (ISBN-10): 3642162797
Copertina rigida
Copertina flessibile
Anno di pubblicazione: 2010
Editore: Kaoru Kurosawa
278 Pagine
Peso: 0,443 kg
Lingua: eng/Englisch
Libro nella banca dati dal 2007-11-20T20:15:34+01:00 (Rome)
Pagina di dettaglio ultima modifica in 2023-06-29T14:20:42+02:00 (Rome)
ISBN/EAN: 9783642162794
ISBN - Stili di scrittura alternativi:
3-642-16279-7, 978-3-642-16279-4
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : kurosawa, proceedings, kuros, heng, swee
Titolo del libro: international international, proceedings conference, conferences proceedings, malacca, lecture notes computer science, malaysia, kurosawa
Dati dell'editore
Autore: Kaoru Kurosawa
Titolo: Lecture Notes in Computer Science; Security and Cryptology; Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings
Editore: Springer; Springer Berlin
279 Pagine
Anno di pubblicazione: 2010-09-27
Berlin; Heidelberg; DE
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
X, 279 p. 26 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; anonymity; block ciphers; calculus; cryptographic protocols; cryptography; digital signatures; formal security models; hash function; hash functions; lattice-based security; pairing; privacy; provable securi; secure block ciphers; security; algorithm analysis and problem complexity; Cryptology; User Interfaces and Human Computer Interaction; Computer Communication Networks; IT Operations; Algorithms; Data and Information Security; Kryptografie, Verschlüsselungstechnologie; Mensch-Computer-Interaktion; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Algorithmen und Datenstrukturen; Computersicherheit; Netzwerksicherheit; EA
Identification.- Improved Zero-Knowledge Identification with Lattices.- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.- Auto Proofs.- A Calculus for Game-Based Security Proofs.- Automating Computational Proofs for Public-Key-Based Key Exchange.- Signature I.- A Framework for Constructing Convertible Undeniable Signatures.- Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm.- Hash Function.- Collision Resistant Double-Length Hashing.- Interpreting Hash Function Security Proofs.- Protocol.- Formal and Precise Analysis of Soundness of Several Shuffling Schemes.- Distinguishing Distributions Using Chernoff Information.- Signature II.- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation.- Invited Talk.- Cryptographic Protocols from Lattices.- Encryption.- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.- Efficient Broadcast Encryption with Personalized Messages.- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.- Signcryption.- Identity Based Public Verifiable Signcryption Scheme.- Fully Secure Threshold Unsigncryption.Altri libri che potrebbero essere simili a questo:
Ultimo libro simile:
9783030014469 Provable Security (Jongkil Kim, Joonsang Baek, Willy Susilo)
< Per archiviare...