|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Tal Malkin , Vladimir Kolesnikov , Allison Lewko , Michalis PolychronakisPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2015 Volume: 9092 Dimensions: Width: 15.50cm , Height: 3.70cm , Length: 23.50cm Weight: 1.080kg ISBN: 9783319281650ISBN 10: 3319281658 Pages: 698 Publication Date: 03 February 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsSecure computation: primitives and new models.- Public key cryptographic primitives.- Secure computation II: applications.- Anonymity and related applications.- Cryptanalysis and attacks (symmetric crypto).- Privacy and policy enforcement.- Authentication via eye tracking and proofs of proximity.- Malware analysis and side channel attacks.- Side channel countermeasures and tamper resistance/PUFs.- Leakage resilience and pseudorandomness.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |