|
Showing 1 - 3 of
3 matches in All Departments
|
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
|
R2,767
Discovery Miles 27 670
|
Ships in 10 - 15 working days
|
This two-volume set of LNCS 12146 and 12147 constitutes the
refereed proceedings of the 18th International Conference on
Applied Cryptography and Network Security, ACNS 2020, held in Rome,
Italy, in October 2020.The conference was held virtually due to the
COVID-19 pandemic. The 46 revised full papers presented were
carefully reviewed and selected from 214 submissions. The papers
were organized in topical sections named: cryptographic protocols
cryptographic primitives, attacks on cryptographic primitives,
encryption and signature, blockchain and cryptocurrency, secure
multi-party computation, post-quantum cryptography.
|
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
|
R2,520
Discovery Miles 25 200
|
Ships in 10 - 15 working days
|
This two-volume set of LNCS 12146 and 12147 constitutes the
refereed proceedings of the 18th International Conference on
Applied Cryptography and Network Security, ACNS 2020, held in Rome,
Italy, in October 2020. The conference was held virtually due to
the COVID-19 pandemic. The 46 revised full papers presented were
carefully reviewed and selected from 214 submissions. The papers
were organized in topical sections named: cryptographic protocols
cryptographic primitives, attacks on cryptographic primitives,
encryption and signature, blockchain and cryptocurrency, secure
multi-party computation, post-quantum cryptography.
The perspective of a society with pervasive computing features is
becoming a reality and is made possible by intelligent devices of
the size of a grain of sand: tiny devices, with many different
degree of miniaturization, power autonomy, communication
capabilities, applications and last but not least costs. Such
devices are resource constrained in memory storage, in computation
power and in energy. Despite the appealing feature and the myriad
of possible applications, the resource constrained nature of such
devices, the wireless environment in which they operate, the
broadcast way to communicate and their unattended use, expose them
to many known threats, while traditional countermeasures cannot be
adopted in the above mentioned technologies: RFID tags and sensor
nodes cannot use asymmetric cryptography, tamper-proof solutions
would increase the costs of such technologies, and so on. This book
describes several protocols specifically designed to be employed in
resource constrained devices, that try to hit the right balance
between security objectives and security overheads.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
R53
Discovery Miles 530
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|