Information Security and Privacy (eBook, PDF)
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II
Redaktion: Zhu, Tianqing; Li, Yannan
113,95 €
113,95 €
inkl. MwSt.
Sofort per Download lieferbar
57 °P sammeln
113,95 €
Als Download kaufen
113,95 €
inkl. MwSt.
Sofort per Download lieferbar
57 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
113,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
57 °P sammeln
Information Security and Privacy (eBook, PDF)
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II
Redaktion: Zhu, Tianqing; Li, Yannan
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 13.52MB
Andere Kunden interessierten sich auch für
- Information Security and Privacy (eBook, PDF)97,95 €
- Applied Cryptography and Network Security (eBook, PDF)65,95 €
- Advances in Information and Computer Security (eBook, PDF)40,95 €
- Machine Learning for Cyber Security (eBook, PDF)81,95 €
- Advances in Information and Computer Security (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
-
-
-
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Post-Quantum Cryptography, Cryptanalysis, Secure Protocols, Application Security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 456
- Erscheinungstermin: 15. Juli 2024
- Englisch
- ISBN-13: 9789819750283
- Artikelnr.: 72240861
- Verlag: Springer Nature Singapore
- Seitenzahl: 456
- Erscheinungstermin: 15. Juli 2024
- Englisch
- ISBN-13: 9789819750283
- Artikelnr.: 72240861
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.
Post Quantum Cryptography.- Improved Multimodal Private Signatures from Lattices.- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm.- Lattice based more general anti leakage model and its application in decentralization.- An Efficient Hardware Implementation of Crystal Dilithium on FPGA.- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.- Jumping for Berstein Yang Inversion.- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs.- Faster verifications and smaller signatures Trade offs for Alteq using rejections.- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks.- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem.- Cryptanalysis.- New Strategy for Evaluating Differential Clustering Effect of uBlock.- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.- Secure Protocols.- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System.- Formal Verification of Challenge Flow in EMV 3D Secure.- Size Hiding Computation in the Honest But Curious Model.- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation.- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation.- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA.- Application Security.- Deep Dive on Relationship between Personality and Password Creation.- Unveiling the Unseen Video Recognition Attacks on Social Software.- An Account Matching Method Based on Hyper Graph.