000 | 04133nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-66626-2 | ||
003 | DE-He213 | ||
005 | 20240730175039.0 | ||
007 | cr nn 008mamaa | ||
008 | 201221s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030666262 _9978-3-030-66626-2 |
||
024 | 7 |
_a10.1007/978-3-030-66626-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity, Privacy, and Applied Cryptography Engineering _h[electronic resource] : _b10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings / _cedited by Lejla Batina, Stjepan Picek, Mainack Mondal. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aX, 259 p. 87 illus., 37 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12586 |
|
505 | 0 | _atPAKE: Typo-Tolerant Password-Authenticated Key Exchange -- PAS-TA-U: PASsword-based Threshold Authentication with Password Update -- Re-Markable: Stealing Watermarked Neural Networks through Synthesis -- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning -- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics -- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT -- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT -- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption -- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures -- An Insecurity Study of Ethereum Smart Contracts -- Cryptographically Secure Multi-Tenant Provisioning of FPGAs -- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes -- Quantum Resource Estimates of Grover'sKey Search on ARIA. | |
520 | _aThis book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9115226 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9115226 |
650 | 2 | 4 |
_aCoding and Information Theory. _9115227 |
700 | 1 |
_aBatina, Lejla. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115228 |
|
700 | 1 |
_aPicek, Stjepan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115229 |
|
700 | 1 |
_aMondal, Mainack. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115230 |
|
710 | 2 |
_aSpringerLink (Online service) _9115231 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030666255 |
776 | 0 | 8 |
_iPrinted edition: _z9783030666279 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12586 _9115232 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-66626-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89757 _d89757 |