Provable and Practical Security - Liu, Joseph K.; Chen, Liqun; Sun, Shi-Feng;(szerk.) - Prospero Internetes Könyváruház

Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part I
 
A termék adatai:

ISBN13:9789819609536
ISBN10:9819609534
Kötéstípus:Puhakötés
Terjedelem:310 oldal
Méret:235x155 mm
Nyelv:angol
Illusztrációk: 22 Illustrations, black & white; 26 Illustrations, color
700
Témakör:

Provable and Practical Security

18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part I
 
Kiadó: Springer
Megjelenés dátuma:
Kötetek száma: 1 pieces, Book
 
Normál ár:

Kiadói listaár:
EUR 70.61
Becsült forint ár:
30 694 Ft (29 232 Ft + 5% áfa)
Miért becsült?
 
Az Ön ára:

28 238 (26 893 Ft + 5% áfa )
Kedvezmény(ek): 8% (kb. 2 456 Ft)
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
 
Beszerezhetőség:

Még nem jelent meg, de rendelhető. A megjelenéstől számított néhány héten belül megérkezik.
 
  példányt

 
Hosszú leírás:

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 



The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 



Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.



Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy

Tartalomjegyzék:

.- Multi-Party Computation.



.- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation.



.- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.



.- Secure Five-party Computation with Private Robustness and Minimal Online Communication.



.- Model Extraction Attack on MPC Hardened Vertical Federated Learning.



.- Searchable Encryption.



.- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding.



.- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage.



.- Encryption.



.- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption.



.- Ideal Public Key Encryption, Revisited.



.- Simple Construction of PEKS from LWE-based IBE in the Standard Model.



.- Signature.



.- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.



.- Tightly Secure Identity-based Signature from Cryptographic Group Actions.



.- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature.



.- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing.



.- Threshold Ring Signatures: From DualRing to the t+1 Rings.



.- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model.