- 5 Ergebnisse
Kleinster Preis: € 39,45, größter Preis: € 101,26, Mittelwert: € 67,49
1
Topics in Cryptology - CT- RSA 2013 by Ed Dawson Paperback | Indigo Chapters
Bestellen
bei Indigo.ca
C$ 132,50
(ca. € 101,26)
Bestellengesponserter Link

Topics in Cryptology - CT- RSA 2013 by Ed Dawson Paperback | Indigo Chapters - neues Buch

2013, ISBN: 9783642360947

This book constitutes the refereed proceedings of the Cryptographers'' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revise… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Topics in Cryptology - CT- RSA 2013
Bestellen
bei Orellfuessli.ch
CHF 67,90
(ca. € 66,08)
Versand: € 17,521
Bestellengesponserter Link
Topics in Cryptology - CT- RSA 2013 - Taschenbuch

2013, ISBN: 9783642360947

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised… Mehr…

Nr. A1027702474. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 6 - 9 Werktagen, zzgl. Versandkosten. (EUR 17.52)
3
Topics in Cryptology - CT- RSA 2013 The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings - Dawson, Ed
Bestellen
bei booklooker.de
€ 39,45
Versand: € 0,001
Bestellengesponserter Link
Dawson, Ed:
Topics in Cryptology - CT- RSA 2013 The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings - gebrauchtes Buch

2013

ISBN: 9783642360947

[PU: Springer Berlin], 23372590/1, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2013, Banküberweisung, Kreditkarte, PayPal, Klarna-Sofortüberweisung, Internationaler Versand

Versandkosten:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Buchpark GmbH
4
Topics in Cryptology - CT- RSA 2013
Bestellen
bei Hugendubel.de
€ 66,49
Versand: € 0,001
Bestellengesponserter Link
Topics in Cryptology - CT- RSA 2013 - Taschenbuch

2013, ISBN: 3642360947

Topics in Cryptology - CT- RSA 2013 ab 66.49 € als Taschenbuch: The Cryptographer`s Track at RSA Conference 2013 San Francisco CA USA February 25- March 1 2013 Proceedings. Auflage 2013. … Mehr…

Nr. 20048599. Versandkosten:, , DE. (EUR 0.00)
5
Topics in Cryptology - CT- RSA 2013 (eBook)
Bestellen
bei VitalSource.com
€ 64,19
Bestellengesponserter Link
Topics in Cryptology - CT- RSA 2013 (eBook) - neues Buch

2013, ISBN: 9783642360947

PRINT ISBN: 9783642360947 E-TEXT ISBN: 9783642360954 Springer Nature eBook Other pricing structure might be available at vitalsource.com., Springer

new in stock Germany. Versandkosten:zzgl. Versandkosten.

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Topics in Cryptology - CT- RSA 2013 by Ed Dawson Paperback | Indigo Chapters

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Detailangaben zum Buch - Topics in Cryptology - CT- RSA 2013 by Ed Dawson Paperback | Indigo Chapters


EAN (ISBN-13): 9783642360947
ISBN (ISBN-10): 3642360947
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2013
Herausgeber: Ed Dawson

Buch in der Datenbank seit 2014-03-22T20:56:41+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-01-24T15:10:39+01:00 (Berlin)
ISBN/EAN: 9783642360947

ISBN - alternative Schreibweisen:
3-642-36094-7, 978-3-642-36094-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: dawson
Titel des Buches: topic, crypto, san francisco, rsa


Daten vom Verlag:

Autor/in: Ed Dawson
Titel: Lecture Notes in Computer Science; Security and Cryptology; Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings
Verlag: Springer; Springer Berlin
405 Seiten
Erscheinungsjahr: 2013-01-02
Berlin; Heidelberg; DE
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XIV, 405 p. 68 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; ciphertext; enterprise defense; hashing; information security; randomness; Cryptology; Data and Information Security; Operating Systems; e-Commerce and e-Business; Computer Communication Networks; Coding and Information Theory; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Betriebssysteme; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; E-Commerce: geschäftliche Aspekte; Netzwerk-Hardware; Informationstheorie; EA

Side Channel Attacks I.- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party.- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.- Public-Key Encryption I.- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.- Cryptographic Protocols I.- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.- Randomized Partial Checking Revisited.- Secure Implementation Methods.- Randomly Failed! The State of Randomness in Current Java Implementations.- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl.- Symmetric Key Primitives I.- Collisions for the WIDEA-8 Compression Function.- Finding Collisions for Round-Reduced SM3.- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures.- Side Channel Attacks II.- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.- Cryptographic Protocols II.- Cryptanalytic Attacks on MIFARE Classic Protocol.- Asynchronous Computational VSS with Reduced Communication Complexity.- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012.- Solving BDD by Enumeration: An Update.- Identity-Based Encryption.- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.- Accountable Authority Identity-Based Encryption with Public Traceability.- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.- Symmetric Key Primitives II.- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.- A FullyHomomorphic Cryptosystem with Approximate Perfect Secrecy.- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Fast-track conference proceedings State-of-the-art research Up-to-date results

< zum Archiv...