top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part III / / Shiho Moriai, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part III / / Shiho Moriai, Huaxiong Wang (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XV, 904 p. 153 illus., 31 illus. in color.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
Blockchains (Databases)
ISBN 3-030-64840-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-Party Computation -- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication -- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning -- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation -- MPC with Synchronous Security and Asynchronous Responsiveness -- Secure MPC: Laziness Leads to GOD -- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z=pk Z -- Towards E ciency-Preserving Round Compression in MPC: Do fewer rounds mean more computation -- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation -- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs -- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security -- Secret Sharing -- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing -- Secret-Shared Shu e -- Attribute-Based Encryption -- Adaptively Secure Inner Product Encryption from LWE -- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions -- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin -- Inner-Product Functional Encryption with Fine-Grained Access Control -- MoniPoly|An Expressive q-SDH-Based Anonymous Attribute-Based Credential System -- Updatable Encryption -- The Direction of Updatable Encryption does not Matter Much -- Improving Speed and Security in Updatable Encryption Schemes -- CCA Updatable Encryption Against Malicious Re-Encryption Attacks -- Determining the Core Primitive for Optimally Secure Ratcheting -- Zero Knowledge -- Cryptography from One-Way Communication: On Completeness of Finite Channels -- Succinct Functional Commitment for a Large Class of Arithmetic Circuits -- Crowd Veri able Zero-Knowledge and End-to-end Verifiable Multiparty Computation -- Non-Interactive Composition of Sigma-Protocols via Share-then-Hash -- Succinct Diophantine-Satisfiability Arguments -- Individual Simulations -- Blockchains and Contact Tracing -- KVaC: Key-Value Commitments for Blockchains and Beyond -- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing.
Record Nr. UNINA-9910447252203321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part I / / Shiho Moriai, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part I / / Shiho Moriai, Huaxiong Wang (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XXVII, 914 p. 123 illus.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-030-64837-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to Build Optimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking.
Record Nr. UNINA-9910447250903321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part II / / Shiho Moriai, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part II / / Shiho Moriai, Huaxiong Wang (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XV, 818 p. 141 illus., 34 illus. in color.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-030-64834-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
Record Nr. UNINA-9910447252303321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part I / / Shiho Moriai, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part I / / Shiho Moriai, Huaxiong Wang (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XXVII, 914 p. 123 illus.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-030-64837-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Best Paper Awards -- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness -- New results on Gimli: full-permutation distinguishers and improved collisions -- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies -- Encryption Schemes -- Public-Key Generation with Verifiable Randomness -- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security -- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors -- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting -- Security Reductions for White-Box Key-Storage in Mobile Payments -- Circular Security Is Complete for KDM Security -- Post-Quantum Cryptography -- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications -- Post-Quantum Veri cation of Fujisaki-Okamoto -- A New Decryption Failure Attack against HQC -- Cryptanalysis -- A Bit-Vector Differential Model for the Modular Addition by a Constant -- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions -- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums -- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC -- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems -- Lower Bounds on the Degree of Block Ciphers -- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT) -- Symmetric Key Cryptography -- Minimizing the Two-Round Tweakable Even-Mansour Cipher -- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption -- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation -- Message Authentication Codes -- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs -- On the Adaptive Security of MACs and PRFs -- How to Build Optimally Secure PRFs Using Block Ciphers -- Side-Channel Analysis -- SILVER - Statistical Independence and Leakage Verification -- Cryptanalysis of Masked Ciphers: A not so Random Idea -- Packed Multiplication: How to Amortize the Cost of Side-channel Masking -- Side Channel Information Set Decoding using Iterative Chunking.
Record Nr. UNISA-996418212203316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part II / / Shiho Moriai, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part II / / Shiho Moriai, Huaxiong Wang (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XV, 818 p. 141 illus., 34 illus. in color.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-030-64834-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public Key Cryptography -- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage -- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions -- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions -- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption -- Unbounded HIBE with Tight Security -- Multi-Client Oblivious RAM with Poly-Logarithmic Communication -- Privacy-Preserving Pattern Matching on Encrypted Data -- Efficient Homomorphic Comparison Methods with Optimal Complexity -- Lattice-Based Cryptography -- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings -- Towards Classical Hardness of Module-LWE: The Linear Rank Case -- Lattice-Based E-Cash, Revisited -- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices -- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers -- Isogeny-Based Cryptography -- Cryptographic Group Actions and Applications -- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion -- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices -- Radical Isogenies -- Oblivious Pseudorandom Functions from Isogenies -- SiGamal: A supersingular isogeny-based PKE and its application to a PRF -- Quantum Algorithms -- Estimating quantum speedups for lattice sieves -- A Combinatorial Approach to Quantum Random Functions -- Improved Classical and Quantum Algorithms for Subset-Sum -- Security Limitations of Classical-Client Delegated Quantum Computing -- Quantum Circuit Implementations of AES with Fewer Qubits -- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories -- Authenticated Key Exchange -- Fuzzy Asymmetric Password-Authenticated Key Exchange -- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
Record Nr. UNISA-996418214903316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part III / / Shiho Moriai, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2020 : 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020 : proceedings, Part III / / Shiho Moriai, Huaxiong Wang (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XV, 904 p. 153 illus., 31 illus. in color.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
Computer security
Blockchains (Databases)
ISBN 3-030-64840-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-Party Computation -- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication -- Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning -- On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation -- MPC with Synchronous Security and Asynchronous Responsiveness -- Secure MPC: Laziness Leads to GOD -- Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z=pk Z -- Towards E ciency-Preserving Round Compression in MPC: Do fewer rounds mean more computation -- Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation -- Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs -- Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security -- Secret Sharing -- ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing -- Secret-Shared Shu e -- Attribute-Based Encryption -- Adaptively Secure Inner Product Encryption from LWE -- Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions -- Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin -- Inner-Product Functional Encryption with Fine-Grained Access Control -- MoniPoly|An Expressive q-SDH-Based Anonymous Attribute-Based Credential System -- Updatable Encryption -- The Direction of Updatable Encryption does not Matter Much -- Improving Speed and Security in Updatable Encryption Schemes -- CCA Updatable Encryption Against Malicious Re-Encryption Attacks -- Determining the Core Primitive for Optimally Secure Ratcheting -- Zero Knowledge -- Cryptography from One-Way Communication: On Completeness of Finite Channels -- Succinct Functional Commitment for a Large Class of Arithmetic Circuits -- Crowd Veri able Zero-Knowledge and End-to-end Verifiable Multiparty Computation -- Non-Interactive Composition of Sigma-Protocols via Share-then-Hash -- Succinct Diophantine-Satisfiability Arguments -- Individual Simulations -- Blockchains and Contact Tracing -- KVaC: Key-Value Commitments for Blockchains and Beyond -- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing.
Record Nr. UNISA-996418215103316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2021 . Part I. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi and Huaxiong Wang, editors
Advances in cryptology - ASIACRYPT 2021 . Part I. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi and Huaxiong Wang, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (715 pages)
Disciplina 001.5436
Collana Lecture notes in computer science, security and cryptology
Soggetto topico Cryptography
Computer security
ISBN 3-030-92062-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910512310103321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2021 . Part III : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2021 . Part III : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (713 pages)
Disciplina 005.82
Collana Lecture notes in computer science, security and cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptography
ISBN 3-030-92078-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910512309903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2021 . Part IV. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang, editors
Advances in cryptology - ASIACRYPT 2021 . Part IV. : 27th International Conference on the Theory and Application of Cryptology and Information Security Singapore, December 6- 10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (784 pages)
Disciplina 001.5436
Collana Lecture notes in computer science, security and cryptology
Soggetto topico Cryptography
Computer security
ISBN 3-030-92068-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510579703321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in cryptology - ASIACRYPT 2021 . Part III : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Advances in cryptology - ASIACRYPT 2021 . Part III : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, proceedings / / Mehdi Tibouchi, Huaxiong Wang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (713 pages)
Disciplina 005.82
Collana Lecture notes in computer science, security and cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptography
ISBN 3-030-92078-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464495803316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui