
Provable and Practical Security
18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part I
Series: Lecture Notes in Computer Science; 14903;
- Publisher's listprice EUR 70.61
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 8% (cc. 2 396 Ft off)
- Discounted price 27 556 Ft (26 244 Ft + 5% VAT)
29 952 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Springer
- Date of Publication 1 February 2025
- Number of Volumes 1 pieces, Book
- ISBN 9789819609536
- Binding Paperback
- No. of pages310 pages
- Size 235x155 mm
- Language English
- Illustrations 22 Illustrations, black & white; 26 Illustrations, color 684
Categories
Long description:
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024.
The 26 full papers and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections:
Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.
Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
MoreTable of Contents:
.- Multi-Party Computation.
.- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation.
.- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.
.- Secure Five-party Computation with Private Robustness and Minimal Online Communication.
.- Model Extraction Attack on MPC Hardened Vertical Federated Learning.
.- Searchable Encryption.
.- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding.
.- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage.
.- Encryption.
.- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption.
.- Ideal Public Key Encryption, Revisited.
.- Simple Construction of PEKS from LWE-based IBE in the Standard Model.
.- Signature.
.- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
.- Tightly Secure Identity-based Signature from Cryptographic Group Actions.
.- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature.
.- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing.
.- Threshold Ring Signatures: From DualRing to the t+1 Rings.
.- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model.
More