Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 58,10
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 59,75
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 60,13
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 60,12
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 78,28
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 66,69
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 73,51
Cantidad disponible: 15 disponibles
Añadir al carritoCondición: New.
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
EUR 91,00
Cantidad disponible: 15 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Springer-Verlag New York Inc, 2019
ISBN 10: 3030299589 ISBN 13: 9783030299583
Librería: Revaluation Books, Exeter, Reino Unido
EUR 87,23
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 840 pages. 9.25x6.10x2.01 inches. In Stock.
Idioma: Inglés
Publicado por Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 3030299589 ISBN 13: 9783030299583
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
Librería: preigu, Osnabrück, Alemania
EUR 50,35
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Computer Security - ESORICS 2019 | 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I | Kazue Sako (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xxv | Englisch | 2019 | Springer | EAN 9783030299583 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Librería: Mispah books, Redhill, SURRE, Reino Unido
EUR 103,74
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. New. book.
Librería: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 46,22
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: new. Questo è un articolo print on demand.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 70,68
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. Print on Demand.
Idioma: Inglés
Publicado por Springer International Publishing Aug 2019, 2019
ISBN 10: 3030299589 ISBN 13: 9783030299583
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security. 840 pp. Englisch.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 71,79
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND.
Idioma: Inglés
Publicado por Springer International Publishing, 2019
ISBN 10: 3030299589 ISBN 13: 9783030299583
Librería: moluna, Greven, Alemania
EUR 48,37
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proce.
Idioma: Inglés
Publicado por Springer, Springer Aug 2019, 2019
ISBN 10: 3030299589 ISBN 13: 9783030299583
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Machine Learning.- Privacy-Enhanced Machine Learning with Functional Encryption.- Towards Secure and Efficient Outsourcing of Machine Learning Classification.- Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data.- BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.- Information Leakage.- The Leakage-Resilience Dilemma.- A Taxonomy of Attacks using BGP Blackholing.- Local Obfuscation Mechanisms for Hiding Probability Distributions.- A First Look into Privacy Leakage in 3D Mixed Reality Data.- Signatures and Re-encryption.- Flexible Signatures: Making Authentication Suitable for Real-Time Environments.- A Dynamic & Revocable Group Merkle Signature.- Puncturable Proxy Re-Encryption supporting to Group Messaging Service.- Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network.- Side Channels.- Side-Channel Aware Fuzzing.- NetSpectre: Read Arbitrary Memory over Network.- maskVerif:Automated Verification of Higher-Order Masking in Presence of Physical Defaults.- Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems.- Formal Modelling and Verification.- A Formal Model for Checking Cryptographic API Usage in JavaScript.- Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification.- Symbolic Analysis of Terrorist Fraud Resistance.- Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.- Attacks.- Where to Look for What You See Is What You Sign User Confusion in Transaction Security.- On the Security and Applicability of Fragile Camera Fingerprints.- Attacking Speaker Recognition Systems with Phoneme Morphing.- Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks.- A Framework for Evaluating Security in the Presence of Signal Injection Attacks.- Secure Protocols.- Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy.- ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation.- Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity.- Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing.- Useful Tools.- Finding Flaws from Password Authentication Code in Android Apps.- Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.- iCAT: An Interactive Customizable Anonymization Tool.- Monitoring the GDPR.- Blockchain and Smart Contracts.- Incentives for Harvesting Attack in Proof of Work mining pools.- A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.- Annotary: A Concolic Execution System for Developing Secure Smart Contracts.- PDFS: Practical Data Feed Service for Smart Contracts.- Towards a Marketplace for Secure Outsourced Computations.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 840 pp. Englisch.