Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings

Author:   Lejla Batina ,  Stjepan Picek ,  Mainack Mondal
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12586
ISBN:  

9783030666255


Pages:   259
Publication Date:   22 December 2020
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Full Product Details

Author:   Lejla Batina ,  Stjepan Picek ,  Mainack Mondal
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12586
Weight:   0.454kg
ISBN:  

9783030666255


ISBN 10:   3030666255
Pages:   259
Publication Date:   22 December 2020
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

tPAKE: Typo-Tolerant Password-Authenticated Key Exchange.- PAS-TA-U: PASsword-based Threshold Authentication with Password Update.- Re-Markable: Stealing Watermarked Neural Networks through Synthesis.- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning.- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics.- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT.- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT.- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures.- An Insecurity Study of Ethereum Smart Contracts.- Cryptographically Secure Multi-Tenant Provisioning of FPGAs.- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes.- Quantum Resource Estimates of Grover’sKey Search on ARIA.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List