Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Lecture Notes in Computer Science Book 9476) 🔍
Michael Reiter, David Naccache (eds.) Springer International Publishing : Imprint : Springer, Lecture Notes in Computer Science, Lecture Notes in Computer Science 9476, 1, 2015
英语 [en] · PDF · 16.5MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
描述
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015.  The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.
备用文件名
lgrsnf/K:\springer\10.1007%2F978-3-319-26823-1.pdf
备用文件名
nexusstc/Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings/32eb617470dff5ff8b5f80642e01cdb8.pdf
备用文件名
scihub/10.1007/978-3-319-26823-1.pdf
备用文件名
zlib/Computers/Networking/Michael Reiter, David Naccache (eds.)/Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings_2677602.pdf
备选标题
Pushing up bluebonnets
备选作者
International Conference on Cryptology and Network Security
备选作者
Leann Sweeney
备用出版商
Recorded Books ; [Made available electronically by] NetLibrary
备用出版商
Springer Nature Switzerland AG
备用出版商
Springer London, Limited
备用出版商
Ebsco Publishing
备用版本
Lone Star audio, Unabridged, Prince Frederick, MD, [Boulder, Colo, 2009
备用版本
Lecture Notes in Computer Science, 9476, 1st ed. 2015, Cham, 2015
备用版本
LNCS sublibrary, 9476, 1st ed. 2015, Cham, 2015
备用版本
United States, United States of America
备用版本
Springer Nature, Cham, 2015
备用版本
Switzerland, Switzerland
备用版本
Nov 20, 2015
元数据中的注释
sm47536463
元数据中的注释
{"container_title":"Lecture Notes in Computer Science","edition":"1","isbns":["1441601791","3319268228","3319268236","9781441601797","9783319268224","9783319268231"],"issns":["0302-9743","1611-3349"],"publisher":"Springer","series":"Lecture Notes in Computer Science 9476"}
元数据中的注释
Source title: Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Lecture Notes in Computer Science (9476))
备用描述
Front Matter....Pages I-X
Front Matter....Pages 1-1
PUDA – Privacy and Unforgeability for Data Aggregation....Pages 3-18
A Security Framework for Internet of Things....Pages 19-31
Privacy-Aware Authentication in the Internet of Things....Pages 32-39
Front Matter....Pages 41-41
Security of Linear Secret-Sharing Schemes Against Mass Surveillance....Pages 43-58
Secure Set-Based Policy Checking and Its Application to Password Registration....Pages 59-74
SEPM: Efficient Partial Keyword Search on Encrypted Data....Pages 75-91
Front Matter....Pages 93-93
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals....Pages 95-110
iDeFEND: Intrusion Detection Framework for Encrypted Network Data....Pages 111-118
On the Weaknesses of PBKDF2....Pages 119-126
Front Matter....Pages 127-127
Verifiable Random Functions from (Leveled) Multilinear Maps....Pages 129-143
A Formal Environment for MANET Organization and Security....Pages 144-159
Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme....Pages 160-175
Front Matter....Pages 177-177
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation....Pages 179-196
Bandwidth-Optimized Secure Two-Party Computation of Minima....Pages 197-213
Outsourcing Secure Two-Party Computation as a Black Box....Pages 214-222
Front Matter....Pages 223-223
What Users Should Know About Full Disk Encryption Based on LUKS....Pages 225-237
Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution....Pages 238-247
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks....Pages 248-256
Back Matter....Pages 257-257
备用描述
Abby Rose is the privileged daughter of a software magnate who became a private investigator when she found out she was illegally adopted. Her latest case is a mystery woman, rescued from a car crash but badly mangled and in a coma. The only clue police found at the scene was one of Abby's business cards
备用描述
Keine Beschreibung vorhanden.
Erscheinungsdatum: 20.11.2015
开源日期
2016-03-14
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。