Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: tit all "Network In Network"



Treffer 14 von 23109 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1369176880
Art des Inhalts Konferenzschrift
Titel Applied Cryptography and Network Security : 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part II / edited by Marc Fischlin, Veelasha Moonsamy
Person(en) Fischlin, Marc (Herausgeber)
Moonsamy, Veelasha (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2025
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2025
Umfang/Format Online-Ressource, XIII, 543 p. 110 illus., 65 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-031-95763-5
Printed edition:: ISBN: 978-3-031-95765-9
Inhalt Side Channels: Not So Secure TSC -- G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels -- Decompose and conquer: ZVP attacks on GLV curves -- Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat. Informatuion Security: Optimal Communication Unbalanced Private Set Union -- Negative Results on Information-theoretic Additive Randomized Encodings -- Two-party ECDSA with JavaCard-based smartcards -- MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion. Privacy & Anonymity: Privately Compute the Item with Maximal Weight Sum in Set Intersection -- Algebraic Zero Knowledge Contingent Payment -- On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme -- AQQUA: Augmenting Quisquis with Auditability. Cryptanalysis: Security Analysis of Forward Secure Log Sealing in Journald -- Generic Security of GCM-SST -- Revisiting the attacker’s knowledge in inference attacks against Searchable Symmetric Encryption -- On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers. Attacks & Vulnerabilities: CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations -- OCEAN: Open-World Contrastive Authorship Identification -- The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach -- Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework
Persistent Identifier URN: urn:nbn:de:101:1-2506200408124.032102815381
DOI: 10.1007/978-3-031-95764-2
URL https://doi.org/10.1007/978-3-031-95764-2
ISBN/Einband/Preis 978-3-031-95764-2
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 15826
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 14 von 23109
< < > <


E-Mail-IconAdministration