Atnaujinkite slapukų nuostatas

El. knyga: Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings

  • Formatas: EPUB+DRM
  • Serija: Security and Cryptology 12024
  • Išleidimo metai: 02-Mar-2020
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9783030417024
  • Formatas: EPUB+DRM
  • Serija: Security and Cryptology 12024
  • Išleidimo metai: 02-Mar-2020
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9783030417024

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019.





The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
Invited Paper.- How to Compartment Secrets - Trust Everybody, but Cut
the Cards (Invited Talk).- Authentication.- A Lattice-based Enhanced Privacy
ID.- A Generic View on the Unified Zero-Knowledge Protocol and its
Applications.- Cryptography.- Verifiable and Private Oblivious Polynomial
Evaluation.- Monomial Evaluation of Polynomial Functions Protected by
Threshold Implementations With an Illustration on AES.- Strong Designated
Verifier Signature Based on the Rank Metric.- A Lightweight Implementation of
NTRU Prime for the Post-Quantum Internet of Things.- Threats.- Fault
Injection Characterization on modern CPUs - From the ISA to the
Micro-Architecture.- Threat Analysis of Poisoning Attack against Ethereum
Blockchain.- A Template-based Method for the Generation of Attack Trees
(short paper).- Cybersecurity.- Analysis of QUIC Session Establishment and
its Implementations.- CompactFlow: A Hybrid Binary Format for Network Flow
Data.- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing
by Remote Entities.- Internet of Things.- Automated Security Analysis of IoT
Software Updates.- Towards a Context-Aware Security and Privacy as a Service
in the Internet of Things (short paper).