libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

fischlin marc (curatore); moonsamy veelasha (curatore) - applied cryptography and network security
Zoom

Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part I

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
140,98 €
NICEPRICE
133,93 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 06/2025





Trama

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.





Sommario

Encryption & Secret Sharing: Registered Matchmaking Encryption.- Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors.- Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices.- Pre-Constructed Publicly Verifiable Secret Sharing and Applications. Blockchains & Decentralized Systems: HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts.- Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment.- SoK: Measuring Blockchain Decentralization.- Automated Selfish Mining Analysis for DAG-Based PoW Consensus Protocols.- Sassafras: Effcient Batch Single Leader Election. Multi-Party Computation: Oblivious suffx sorting: A multi-party computation scheme for secure and effcient suffx sorting.- Share&Shrink: Effcient and Delegatable MPC in one Broadcast then Asynchrony.- Delayed-Input Multi-Party Computation.- Quantum-Safe Public Key Blinding from MPC-in-the-Head Signature Schemes. Network Security: Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing.- TAU: Trust via Asynchronous Updates for Satellite Network Resiliency. Cryptographic primitives and protocols: Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization.- Distributed Asynchronous Remote Key Generation.- Anonymous Authenticated Key Exchange.- Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor.- Tighter provable security for TreeKEM.











Altre Informazioni

ISBN:

9783031957604

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XXII, 599 p. 107 illus., 59 illus. in color.
Pagine Arabe: 599
Pagine Romane: xxii


Dicono di noi